default search action
René Govaerts
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
1990 – 1999
- 1997
- [c32]Antoon Bosselaers, René Govaerts, Joos Vandewalle:
SHA: A Design for Parallel Architectures? EUROCRYPT 1997: 348-362 - [c31]Cristian Radu, René Govaerts, Joos Vandewalle:
Efficient Electronic Cash with Restricted Privacy. Financial Cryptography 1997: 57-70 - [c30]Cristian Radu, René Govaerts, Joos Vandewalle:
Witness Hiding Restrictive Blind Signature Scheme. IMACC 1997: 283-294 - [c29]Mark Vandenwauver, René Govaerts, Joos Vandewalle:
How Role Based Access Control is Implemented in SESAME. WETICE 1997: 293-298 - 1996
- [c28]Cristian Radu, René Govaerts, Joos Vandewalle:
A Restrictive Blind Signature Scheme with Applications to Electronic Cash. Communications and Multimedia Security 1996: 196-207 - [c27]Antoon Bosselaers, René Govaerts, Joos Vandewalle:
Fast Hashing on the Pentium. CRYPTO 1996: 298-312 - 1995
- [c26]Cristian Radu, René Govaerts, Joos Vandewalle:
Prepaid Electronic Cheques Using Public-Key Certificates. IMACC 1995: 132-141 - 1994
- [c25]Joan Daemen, René Govaerts, Joos Vandewalle:
Correlation Matrices. FSE 1994: 275-285 - 1993
- [c24]Bart Preneel, René Govaerts, Joos Vandewalle:
Differential Cryptanalysis of Hash Functions Based on Block Ciphers. CCS 1993: 183-188 - [c23]Antoon Bosselaers, René Govaerts, Joos Vandewalle:
Comparison of Three Modular Reduction Functions. CRYPTO 1993: 175-186 - [c22]Joan Daemen, René Govaerts, Joos Vandewalle:
Weak Keys for IDEA. CRYPTO 1993: 224-231 - [c21]Bart Preneel, René Govaerts, Joos Vandewalle:
Hash Functions Based on Block Ciphers: A Synthetic Approach. CRYPTO 1993: 368-378 - [c20]Joan Daemen, René Govaerts, Joos Vandewalle:
Resynchronization Weaknesses in Synchronous Stream Ciphers. EUROCRYPT 1993: 159-167 - [c19]Joan Daemen, René Govaerts, Joos Vandewalle:
A New Approach to Block Cipher Design. FSE 1993: 18-32 - [e1]Bart Preneel, René Govaerts, Joos Vandewalle:
Computer Security and Industrial Cryptography - State of the Art and Evolution, ESAT Course, Leuven, Belgium, May 21-23, 1991. Lecture Notes in Computer Science 741, Springer 1993, ISBN 3-540-57341-0 [contents] - 1992
- [c18]Bart Preneel, René Govaerts, Joos Vandewalle:
On the Power of Memory in the Design of Collision Resistant Hash Functions. AUSCRYPT 1992: 105-121 - [c17]Bart Preneel, René Govaerts, Joos Vandewalle:
An Attack on Two Hash Functions by Zheng-Matsumoto-Imai. AUSCRYPT 1992: 535-538 - [c16]Jan Verschuren, René Govaerts, Joos Vandewalle:
Realization of the Bell-LaPadula Security Policy in an OSI-Distributed System using Asymmetric and Symmetric Cryptographic Algorithms. CSFW 1992: 168-178 - [c15]Joan Daemen, René Govaerts, Joos Vandewalle:
A Hardware Design Model for Cryptographic Algorithms. ESORICS 1992: 419-434 - 1991
- [c14]Joos Vandewalle, René Govaerts, Bart Preneel:
Technical Approaches to Thwart Computer Fraud. Computer Security and Industrial Cryptography 1991: 20-30 - [c13]Bart Preneel, René Govaerts, Joos Vandewalle:
Information Authentication: Hash Functions and Digital Signatures. Computer Security and Industrial Cryptography 1991: 87-131 - [c12]Jan Verschuren, René Govaerts, Joos Vandewalle:
ISO-OSI Security Architecture. Computer Security and Industrial Cryptography 1991: 179-192 - [c11]Antoon Bosselaers, René Govaerts, Joos Vandewalle:
Cryptography Within Phase I of the EEC-RACE Programme. Computer Security and Industrial Cryptography 1991: 227-234 - [c10]Joan Daemen, René Govaerts, Joos Vandewalle:
A Framework for the Design of One-Way Hash Functions Including Cryptanalysis of Damgård's One-Way Function Based on a Cellular Automaton. ASIACRYPT 1991: 82-96 - [c9]Joan Daemen, Antoon Bosselaers, René Govaerts, Joos Vandewalle:
Collisions for Schnorr's Hash Function FFT-Hash Presented at Crypto '91. ASIACRYPT 1991: 477-480 - [c8]Bart Preneel, René Govaerts, Joos Vandewalle:
Boolean Functions Satisfying Higher Order Propagation Criteria. EUROCRYPT 1991: 141-152 - 1990
- [j2]Bart Preneel, Antoon Bosselaers, René Govaerts, Joos Vandewalle:
Cryptanalysis of a fast cryptographic checksum algorithm. Comput. Secur. 9(3): 257-262 (1990) - [c7]Bart Preneel, Werner Van Leekwijck, Luc Van Linden, René Govaerts, Joos Vandewalle:
Propagation Characteristics of Boolean Functions. EUROCRYPT 1990: 161-173
1980 – 1989
- 1989
- [c6]Bart Preneel, Antoon Bosselaers, René Govaerts, Joos Vandewalle:
A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang. CRYPTO 1989: 154-163 - 1988
- [c5]Frank Hoornaert, Marc Decroos, Joos Vandewalle, René Govaerts:
Fast RSA-Hardware: Dream or Reality? EUROCRYPT 1988: 257-264 - 1987
- [c4]F. Jorissen, Joos Vandewalle, René Govaerts:
Extension of Brickell's Algorithm for Breaking High Density Knapsacks. EUROCRYPT 1987: 109-115 - 1986
- [i1]Henri Cloetens, Yvo Desmedt, Luc Bierens, Joos Vandewalle, René Govaerts:
Additional Properties in the S-Boxes of the DES. EUROCRYPT 1986: 20 - 1985
- [c3]Joos Vandewalle, René Govaerts, W. De Becker, Marc Decroos, G. Speybrouck:
Implementation Study of Public Key Cryptographic Protection in an Existing Electronic Mail and Document Handling System. EUROCRYPT 1985: 43-49 - 1984
- [j1]Yvo Desmedt, Joos Vandewalle, René Govaerts:
A critical analysis of the security of knapsack public-key algorithms. IEEE Trans. Inf. Theory 30(4): 601-610 (1984) - [c2]René Govaerts, Yvo Desmedt, Joos Vandewalle:
Cryptography: How to Attack, What to Protect? ICC (1) 1984: 175-178 - 1983
- [c1]Marc Davio, Yvo Desmedt, Marc Fosseprez, René Govaerts, Jan Hulsbosch, Patrik Neutjens, Philippe Piret, Jean-Jacques Quisquater, Joos Vandewalle, Pascal Wouters:
Analytical Characteristics of the DES. CRYPTO 1983: 171-202
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint