IEEE Milestone Award Ceremony

Honoring the selection of the Belgian cipher Rijndael as the Advanced Encryption Standard (AES)

November 18, 2025
Heverlee, Belgium

Presentation

The Advanced Encryption Standard (AES) is a critical component of modern cybersecurity, serving as the foundation for securing sensitive data in both public and private sectors. Designed by Joan Daemen and Vincent Rijmen in 1997 and adopted as a federal standard by the U.S. National Institute of Standards and Technology (NIST) in 2001, AES replaced the aging Data Encryption Standard (DES), which had become vulnerable to brute-force attacks. AES offers a significant improvement in security and performance, making it suitable for a wide range of applications—from protecting classified government information to securing online transactions and personal data.

One of the primary reasons for AES’s importance lies in its robust design and efficiency. AES supports key sizes of 128, 192, and 256 bits, offering strong protection against brute-force attacks. Its symmetric key algorithm allows for fast encryption and decryption processes, making it ideal for devices with limited processing power, such as smartphones and IoT devices. Additionally, AES has been extensively analyzed and tested by cryptographers worldwide, earning a reputation for being both secure and reliable. Its efficiency and resilience have made it a standard in protocols like HTTPS, VPNs, and secure messaging platforms.

Beyond technical strength, AES plays a strategic role in global digital trust. As data privacy regulations become more stringent and cyber threats more sophisticated, AES ensures compliance with legal standards and helps prevent data breaches that can lead to financial loss and reputational damage. It also facilitates secure communication between governments, businesses, and individuals across borders. The widespread adoption of AES underscores its role as a cornerstone of data protection in our increasingly digital and interconnected world.

For these reasons, an IEEE Milestone Award is dedicated to AES. The Milestone will be placed in the wall of the Arenberg castle, Heverlee, where both designers defended their PhD on which most of the ideas underlying AES are based.

Program

Below you can find the program for Rijndael IEEE Milestone 2025. The talks are aimed at a general audience. We will keep this page regularly updated.


The following will be held at Auditorium Tweede Hoofdwet.


14.00 Welcome

Koen Wauters


14.10 Encryption vs. Inspection: Balancing Privacy with Security

Laurie-Anne Bourdain

Bio

Laurie-Anne is Chief Information Security Officer for a university hospital in Brussels. She focuses on Governance, Risk and Compliance topics and in an expert in compliance implementation with European regulations such as NIS2, DORA or the GDPR. She previously was a consultant within EY where she led the privacy practice for Belgium (non-banking sector), ISO/DPO at Isabel a Belgian FinTech, and Senior Privacy Manager at Sony Electronics; in these positions she helped companies implementing the requirements of GDPR: from identification of personal data to design of documentation and handling of data subjects’ requests. She also has a strong background in information security and is certified CISSP, FIP, CIPP/E, CIPM, CDPSE and DPO under the CNIL referential.

Abstract

With the rise of data protection regulations like GDPR a greater emphasis is placed on privacy, encryption has become a primary tool in safeguarding personal data, in addition to company data. However, organizations also require the ability to inspect encrypted data to detect and mitigate security threats. This talk will explore the inherent tension between the use of strong encryption to protect data and the need for security teams to access encrypted data for threat detection and response. It will also explore techniques such as data anonymization and privacy-preserving analytics, which allow security teams to monitor systems without violating user privacy, as well as governance practices that ensure compliance with privacy laws while enabling robust threat detection capabilities.


14.55 Local Mess: How Billions of Android Users Were Tracked Through Localhost Communications

Güneş Acar

Bio

Gunes Acar is an Assistant Professor in the Digital Security group at Radboud University. His research focuses on uncovering privacy and security risks across the web, mobile, and IoT ecosystems, with a particular focus on unconventional tracking methods. He also studies deceptive and manipulative (dark) design patterns, and anonymous communication networks.

Acar's findings have influenced web standards, strengthened privacy tools, and prompted fixes in major browsers, websites, and smart devices. His work has been recognized with awards such as the CNIL-Inria Privacy Protection Award and has been featured in leading outlets including The New York Times, BBC, Le Monde, and Der Spiegel.

Before joining Radboud, Acar held research positions at Princeton University and KU Leuven, where he also completed his PhD. In addition to his academic work, he contributes to open-source projects and regularly engages with data protection authorities worldwide. Further details on his research and contributions can be found at gunesacar.net.

Abstract

The talk will describe how a little-known communication channel between web pages and mobile apps has been quietly exploited to track Android users on a massive scale. Our investigation uncovered a previously unknown tracking technique that made it possible for Meta (Facebook) and Yandex to bypass standard privacy protections and monitor users’ web activity, even in private browsing mode. We will explain how the "Local Mess" tracking method works, why it went undetected for so long, and how our team from three European research institutions (Radboud University, KU Leuven, and IMDEA Networks) uncovered it. The talk will also highlight what makes this method uniquely invasive and discuss its broader implications for digital privacy and security. Finally, we will outline how our findings led to concrete changes by major browser vendors, and offer recommendations for researchers, mobile platforms, regulators, and website owners to help prevent similar abuses going forward. More information and materials related to this research are publicly available at https://localmess.github.io.


15.40 Break
16.00 Side-Channel Attacks and AES

Stefan Mangard

Bio

Prof. Stefan Mangard is a leading researcher in hardware security, with a focus on side-channel attacks and secure cryptographic implementations. He received his MSc and PhD in Computer Engineering from Graz University of Technology. Prior to his academic career, he worked as a security architect at Infineon Technologies, where he contributed to the design of secure smart card platforms.
He has authored about 150 peer-reviewed publications and a widely cited textbook on power analysis attacks. Prof. Mangard is recipient of an ERC Consolidator Grant for his work on securing processors against physical attacks.

Abstract

The academic research on side-channel attacks started only a few years before the standardization of AES. This was the basis for a long relationship. Meanwhile thousands of publications have appeared that discuss attacks and countermeasures in the context of AES.
This talk starts with the early days of power analysis and provides a short overview of the evolution of attacks and countermeasures. Based on this, it discusses current trends in the research and the question of which scenarios do actually require protecting AES against side-channel attacks in practice. Finally, there is an outlook into the future based on hypotheses on how the story of side-channels and AES could continue.


16.45 25 Years of AES: Reflections by Rijndael's Inventors

Joan Daemen & Vincent Rijmen

Bio

Joan Daemen is full professor symmetric cryptography at the Radboud University of Nijmegen, the Netherlands. Next to being one of the designers of the block cipher Rijndael, selected by NIST as AES in 2000, he is also in the designers team of the innovative Keccak hash function, selected as the SHA-3 hash standard by NIST in 2012. Moreover, he is a founder of permutation-based cryptography that next to Keccak gave rise to many new designs including the NIST lightweight cryptography standard Ascon, published in 2025. Additionally, he has over 20 years of security industry experience as a security architect and applied cryptographer for STMicroelectronics. His work in cryptography has resulted in multiple awards and prizes and he has many influential publications on cryptographic design including a book on Rijndael, co-written with Prof. Vincent Rijmen.

Vincent Rijmen is full professor symmetric cryptography at the KU Leuven, Belgium. Together with Joan Daemen, he designed the block cipher Rijndael, selected by NIST as AES in 2000. He is also co-designer of the Threshold Implementation (TI) method to secure hardware implementations against side-channel attacks. He is author of many publications in the fields of symmetric cryptography and side-channel attacks. He was involved in several industry and/or government projects related to IT-security, e.g. the message authentication for Galileo navigation messages. He has won several awards for his work in cryptography.

Abstract

On October 2, 2000, NIST announced Rijndael as the winner of the AES competition to replace DES. In this talk, inventors Vincent Rijmen and Joan Daemen look back on the motivations behind the contest, its progression, and the competing candidates. They explain the design principles behind Rijndael and how these led to its strong implementation characteristics. Now, 25 years later, AES is ubiquitous in digital security. The speakers will discuss how AES is used in encryption, authentication, and authenticated encryption through various modes of operation. While the security of block ciphers like AES cannot be mathematically proven, its strength rests on sustained resistance to cryptanalysis. Despite past claims of breaks, none have held up — and AES remains more robust than ever.


17.30 Closing Remarks

The following will be held at Arenberg Castle, Kasteelpark Arenberg 1, 3001 Heverlee, Belgium.

18.00 Unveiling of the Milestone

Thomas Coughlin

Martin Bastiaans

Stefaan Vaes

Mohamed Ridouani


18.30 Reception

Participants & Organizers

Organizers

Joan Daemen — Radboud University, The Netherlands        
Vincent Rijmen — KU Leuven, Belgium        
Luc Claesen — IEEE Life Member Affinity Group        
Dirk Rabaey — IEEE Life Member Affinity Group       
Wim van Etten — IEEE Life Member Affinity Group        
Patrick Dewilde — IEEE Life Member Affinity Group        

Speakers

Laurie-Anne Bourdain — Isabel Group, Belgium        
Güneş Acar — Radboud University, The Netherlands        
Stefan Mangard - TU Graz, Austria        
Joan Daemen — Radboud University, The Netherlands        
Vincent Rijmen — KU Leuven, Belgium        

Venue

The event will be held at Auditorium Tweede Hoofdwet, Kasteelpark Arenberg 41, 3001 Heverlee, Belgium.

Address

Auditorium Tweede Hoofdwet
Kasteelpark Arenberg
3001 Heverlee
Belgium

Directions
The venue is 25 minutes away by bus from the central station.

Registration


Click here to access the registration form.

Sponsors


TII logo
TII logo
TII logo

Contact Information