WorldCat Identities

Rijmen, Vincent 1970-

Overview
Works: 18 works in 90 publications in 2 languages and 2,416 library holdings
Genres: Conference proceedings 
Roles: Editor, Other, Creator
Classifications: QA76.9.A25, 005.8
Publication Timeline
Key
Publications about  Vincent Rijmen Publications about Vincent Rijmen
Publications by  Vincent Rijmen Publications by Vincent Rijmen
Most widely held works by Vincent Rijmen
Advanced encryption standard -- AES 4th international conference, AES 2004, Bonn, Germany, May 10-12, 2004 : revised selected and invited papers by Hans Dobbertin ( )
13 editions published in 2005 in English and held by 559 WorldCat member libraries worldwide
"This volume comprises the proceedings of the 4th Conference on Advanced Encryption Standard, 'AES - State of the Crypto Analysis', which was held in Bonn, Germany, during 10-12 May 2004."
Progress in cryptology INDOCRYPT 2008 : 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008 : proceedings by Dipanwita Roy Chowdhury ( )
13 editions published in 2008 in English and held by 449 WorldCat member libraries worldwide
Selected areas in cryptography 16th annual international workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, revised selected papers by Michael Jacobson ( )
9 editions published in 2009 in English and held by 397 WorldCat member libraries worldwide
State of the art in applied cryptography : course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lectures by Gerhard Goos ( Book )
13 editions published in 1998 in English and German and held by 326 WorldCat member libraries worldwide
This book is based on a course on the state of the art of computer security and industrial cryptography held at the Katholieke Universiteit Leuven, Belgium in June 1997. The 19 revised full presentations included in the book are developed from lectures given during the course. The areas covered range from theoretical prerequisites and recent technical developments to standardization issues and real-world applications. Among the topics addressed are cryptographic primitives, block ciphers, authentication, cryptographic algorithms, public-key crypto systems, key management, network security, Internet security protocols, key escrow, smart cart security, digital cash, systems security, security management, and IT security standardization
Fast software encryption : 9th international workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002 : revised papers by Joan Daemen ( Book )
12 editions published in 2002 in English and held by 289 WorldCat member libraries worldwide
This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Fast Software Encryption, FSE 2002, held in Leuven, Belgium in February 2002. The 21 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on blook cipher cryptoanalysis, integral cryptoanalysis, block cipher theory, stream cipher design, stream cipher cryptanalysis, and odds and ends
The design of Rijndael : AES--the Advanced Encryption Standard by Joan Daemen ( Book )
11 editions published between 2001 and 2011 in English and held by 277 WorldCat member libraries worldwide
"This book is the story of the design of Rijndael [winner of the contest for the new Advanced Encryption Standard (AES) for the United States, organized by NIST in January 1997], as told by the designers themselves. It outlines the foundations of Rijndael in relation to the previous ciphers the authors have designed. It explains the mathematics needed to understand the operation of Rijndael, and it provides reference C code and test vectors for the cipher"--p. [v]
The design of Rijndael : AES - the advanced encryption standard ; with 17 tables by Joan Daemen ( Book )
1 edition published in 2002 in English and held by 40 WorldCat member libraries worldwide
Information security 11th international conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008 : proceedings by ISC (Conference : Information security) ( )
3 editions published in 2008 in English and held by 30 WorldCat member libraries worldwide
Symmetric cryptography 07021 abstracts collection ; Dagstuhl seminar ( )
2 editions published in 2007 in English and held by 17 WorldCat member libraries worldwide
Seminar on symmetric cryptography Dagstuhl seminar 07021 ; 07.01.07-12.01.07 ; executive summary ( )
2 editions published in 2007 in English and held by 17 WorldCat member libraries worldwide
Selected areas in cryptography by SAC 2009 ( Book )
1 edition published in 2009 in English and held by 3 WorldCat member libraries worldwide
Development of identity-based authenticated key agreement protocols : doctor of philosophy thesis by Marko Hölbl ( Book )
1 edition published in 2009 in English and held by 3 WorldCat member libraries worldwide
Key agreement protocols enable two or more entities to establish a shared session key which can be later used to achieve a cryptographic goal such as encryption of data sent over an insecure network. In addition, authenticated key agreement protocols assure authenticity of the participating entities. Different approaches can be used when developing authenticated key agreement protocols which affect their security and efficiency. Security of an authenticated key agreement protocol is defined using security attributes. Themain goal is to develop a protocol which is secure and efficient at the same time. This thesis discusses two-party and three-party identity-based authenticated key agreement protocols, their security and efficiency attributes and presents several contributions to the field. Firstly, two new two-party identity-based authenticated key agreement protocol using modular arithmetics are proposed, namely IDAK2-1 and IDAK2-2. Secondly, a key compromise impersonation attack on Scott's two-party identity-based authenticated key agreement protocol using pairings is described and two new two-party identity-based authenticated key agreement protocols which employ pairings are proposed - IDAK2P-1 and IDAK2P-2. Finally, two new three-party identity-based authenticated key agreement protocols which employ pairings areproposed, named IDAK3P-1 and IDAK3P-2. All proposed protocols are evaluatedregarding security and efficiency. The security comparison criterion is based upon the fulfillment of security attributes while the efficiency criterion is defined partly in scope of the thesis and partly from literature.It includes computational as well as communicational efficiency. Moreover, the proposed protocols are compared to existing ones with regard to efficiency and security. The security criterion is defined as the fulfillment of security attributes and the existence of attacks for a specific protocol. The efficiency comparison criterion is defined by the communicational and computation effort of each protocol. Additionally, a comprehensive in-depth review of existing two-party and three-party identity-based authenticated key agreement protocols, their properties and known attacks is given. The results of the thesis regarding two-party identity-based key agreement protocols using modular arithmetics indicate that IDAK2-1 and IDAK2-2 conform to all security attributes. IDAK2-2 is the most efficient protocol of the group equalto Saeednia et al's protocol, whereas IDAK2-1 is the second most efficient protocol of the group. Regarding two-party identity-based authenticated key agreement protocol employing pairing operations, both IDAK2P-1 and IDAK2P-2 offer all the security attributes, whereas several competitive protocols do not. IDAK2P-2 is among the most efficient protocols if pre-computations are taken into consideration, while IDAK2P-1 is more efficient than Choie-Jeong-Lee's protocol I. In the group of three-party identity-based authenticated key agreement protocols, the proposed IDAK3P-1 protocol conforms to all security attributes, whereas IDAK3P-2 lacks in perfect forward secrecy. However, specific competitive protocols share this deficiency. Regarding efficiency, IDAK3P-1 is the most efficient protocol, while IDAK3P-2 is the second most efficient and at the same level as Shim's protocol
State of the art in applied cryptography : Course on Computer Security and industrial Cryptography : Leuven, Belgium, June 1997 : revised lectures by Course on Computer Security and Industrial Cryptography ( Book )
1 edition published in 1998 in English and held by 3 WorldCat member libraries worldwide
The design of Rijndael : the wide trail strategy explained by Joan Daemen ( Book )
1 edition published in 2001 in English and held by 2 WorldCat member libraries worldwide
Fast software encryption : 9th International Workshop, FSE 2002 : revised papers ( Book )
2 editions published in 2002 in English and held by 1 WorldCat member library worldwide
Advanced encryption standard- AES 4th International Conference, AES 2004 : Bonn, Germany, May 10-12, 2004 : revised selected and invited papers by Conference on Advanced Encryption Standard ( )
1 edition published in 2005 in English and held by 1 WorldCat member library worldwide
State of the Art in Applied Cryptography : Course on Computer Security and Industrial Cryptography ( Book )
1 edition published in 1998 in English and held by 1 WorldCat member library worldwide
State of the art in applied cryptography : course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 ( )
3 editions published in 1998 in English and held by 1 WorldCat member library worldwide
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.76 (from 0.00 for Developmen ... to 0.86 for Fast softw ...)
Languages
English (89)
German (1)
Covers