Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Joos Vandewalle
Search web for home page
Publications
year
title
booktitle
pages
1
2003
Cryptanalysis of SOBER-t32
fse
online
2
2003
Cryptanalysis of 3-Pass HAVAL
asiacrypt
online
3
2002
Square Attacks on Reduced-Round Variants of the Skipjack Block Cipher
eprint
online
4
2002
Applying General Access Structure to Metering Schemes
eprint
online
5
2002
Applying General Access Structure to Proactive Secret Sharing Schemes
eprint
online
6
2002
A note on Weak Keys of PES, IDEA and some Extended Variants
eprint
online
7
2002
On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem
pkc
199-210
8
2001
A Memory Efficient Version of Satoh's Algorithm
eurocrypt
1-13
9
2001
Producing Collisions for PANAMA
fse
37-51
10
2001
Improved SQUARE Attacks against Reduced-Round HIEROCRYPT
fse
165-173
11
2001
SQUARE Attacks on Reduced-Round PES and IDEA Block Ciphers
eprint
online
12
2000
Linear Cryptanalysis of Reduced-Round Versions of the SAFER Block Cipher Family
fse
244-261
13
1999
Linear Cryptanalysis of RC5 and RC6
fse
16-30
14
1997
SHA: A Design for Parallel Architectures?
eurocrypt
348-362
15
1996
A Fast Software Implementation for Arithmetic Operations in GF(2
n
)
asiacrypt
65-76
16
1996
Fast Hashing on the Pentium
crypto
298-312
17
1994
Correlation Matrices
fse
275-285
18
1993
Comparison of Three Modular Reduction Functions
crypto
175-186
19
1993
Hash Functions Based on Block Ciphers: A Synthetic Approach
crypto
368-378
20
1993
A New Approach to Block Cipher Design
fse
18-32
21
1993
Weak Keys for IDEA
crypto
224-231
22
1993
Resynchronization Weaknesses in Synchronous Stream Ciphers
eurocrypt
159-167
23
1992
On the Power of Memory in the Design of Collision Resistant Hash Functions
auscrypt
105-121
24
1992
An Attack on Two Hash Functions by Zheng-Matsumoto-Imai
auscrypt
535-538
25
1991
Collisions for Schnorr's Hash Function FFT-Hash Presented at Crypto '91
asiacrypt
477-480
26
1991
A Framework for the Design of One-Way Hash Functions Including Cryptanalysis of Damgård's One-Way Function Based on a Cellular Automaton
asiacrypt
82-96
27
1991
Boolean Functions Satisfying Higher Order Propagation Criteria
eurocrypt
141-152
28
1990
Propagation Characteristics of Boolean Functions
eurocrypt
161-173
29
1989
A European Call For Cryptographic Algorithms: Ripe; Race Integrity Primitives Evaluation
eurocrypt
267-271
30
1989
A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang
crypto
154-163
31
1988
Fast RSA-Hardware: Dream or Reality?
eurocrypt
257-264
32
1987
Security Considerations in the Design and Implementation of a new DES chip
eurocrypt
287-300
33
1987
Extension of Brickell's Algorithm for Breaking High Density Knapsacks
eurocrypt
109-115
34
1986
Additional Properties in the S-Boxes of the DES
eurocrypt
20
35
1985
Implementation Study of Public Key Cryptographic Protection in an Existing Electronic Mail and Document Handling System
eurocrypt
43-49
36
1983
Analytical Characteristics of the DES
crypto
171-202
Coauthors of Joos Vandewalle
Steve Babbage
Paulo S. L. M. Barreto
W. De Becker
Luc Bierens
Alex Biryukov
Johan Borst
Antoon Bosselaers
Christophe De Cannière
David Chaum
Henri Cloetens
Joan Daemen
Marc Davio
Marc Decroos
Yvo Desmedt
Marc Fosseprez
Walter Fumy
Peter De Gersem
René Govaerts
H.Y.Kim
Frank Hoornaert
Jan Hulsbosch
Cees J. A. Jansen
F. Jorissen
Jorge Nakahara Jr.
Hae Yong Kim
Peter Landrock
Joseph Lano
Werner Van Leekwijck
Luc Van Linden
Hugo De Man
Patrik Neutjens
Ventzislav Nikov
Svetla Nikova
Philippe Piret
Bart Preneel
Jean-Jacques Quisquater
Michaël Quisquater
Vincent Rijmen
Gert Roelofsen
Bart Van Rompay
G. Speybrouck
Servaas Vandenberghe
Ingrid Verbauwhede
Frederik Vercauteren
Erik De Win
Pascal Wouters