메뉴 건너뛰기




Volumn 5677 LNCS, Issue , 2009, Pages 231-249

Distinguisher and related-key attack on the full AES-256

Author keywords

AES; Chosen key distinguisher; Davies Meyer; Ideal cipher; Related key attack

Indexed keywords

AES; CHOSEN KEY DISTINGUISHER; DAVIES-MEYER; IDEAL CIPHER; RELATED-KEY ATTACK;

EID: 70350346078     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03356-8_14     Document Type: Conference Paper
Times cited : (224)

References (15)
  • 1
    • 24944515451 scopus 로고    scopus 로고
    • Related-key boomerang and rectangle attacks
    • Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Biham, E., Dunkelman, O., Keller, N.: Related-key boomerang and rectangle attacks. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 507-525. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 507-525
    • Biham, E.1    Dunkelman, O.2    Keller, N.3
  • 2
    • 33746676877 scopus 로고    scopus 로고
    • Black, J.: The ideal-cipher model, revisited: An uninstantiable blockcipher-based hash function. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, 4047, pp. 328-340. Springer, Heidelberg (2006)
    • Black, J.: The ideal-cipher model, revisited: An uninstantiable blockcipher-based hash function. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol. 4047, pp. 328-340. Springer, Heidelberg (2006)
  • 3
    • 50449107349 scopus 로고    scopus 로고
    • Black-box analysis of the block-cipher-based hash-function constructions from PGV
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Black, J., Rogaway, P., Shrimpton, T.: Black-box analysis of the block-cipher-based hash-function constructions from PGV. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 320 335. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 320-335
    • Black, J.1    Rogaway, P.2    Shrimpton, T.3
  • 4
    • 4243180376 scopus 로고    scopus 로고
    • The random oracle methodology, revisited
    • Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. J. ACM 51(4), 557-594 (2004)
    • (2004) J. ACM , vol.51 , Issue.4 , pp. 557-594
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 6
    • 84974678303 scopus 로고    scopus 로고
    • Ferguson, N., Kelsey, J., Lucks, S., Schneier, B., Stay, M., Wagner, D., Whiting, D.: Improved cryptanalysis of Rijndael. In: Schneier, B. (ed.) FSE 2000. LNCS, 1978, pp. 213-230. Springer, Heidelberg (2000)
    • Ferguson, N., Kelsey, J., Lucks, S., Schneier, B., Stay, M., Wagner, D., Whiting, D.: Improved cryptanalysis of Rijndael. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 213-230. Springer, Heidelberg (2000)
  • 7
    • 84949450111 scopus 로고    scopus 로고
    • Jaulmes, É., Joux, A., Valette, F.: On the security of randomized cbc-mac beyond the birthday paradox limit: A new construction. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, 2365, pp. 237-251. Springer, Heidelberg (2002)
    • Jaulmes, É., Joux, A., Valette, F.: On the security of randomized cbc-mac beyond the birthday paradox limit: A new construction. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 237-251. Springer, Heidelberg (2002)
  • 8
    • 33645780237 scopus 로고    scopus 로고
    • Multicollisions in iterated hash functions. Application to cascaded constructions
    • Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
    • Joux, A.: Multicollisions in iterated hash functions. Application to cascaded constructions. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 306-316. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 306-316
    • Joux, A.1
  • 9
    • 67650155452 scopus 로고    scopus 로고
    • Khovratiovich, D., Biryukov, A., Nikolić, I.: Speeding up collision search for byte-oriented hash functions. In: CT-RSA 2009. LNCS, 5473, pp. 164-181. Springer, Heidelberg (2009)
    • Khovratiovich, D., Biryukov, A., Nikolić, I.: Speeding up collision search for byte-oriented hash functions. In: CT-RSA 2009. LNCS, vol. 5473, pp. 164-181. Springer, Heidelberg (2009)
  • 10
    • 38149085478 scopus 로고    scopus 로고
    • Kim, J., Hong, S., Preneel, B.: Related-key rectangle attacks on reduced AES-192 and AES-256. In: Biryukov, A. (ed.) FSE 2007. LNCS, 4593, pp. 225-241. Springer, Heidelberg (2007)
    • Kim, J., Hong, S., Preneel, B.: Related-key rectangle attacks on reduced AES-192 and AES-256. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 225-241. Springer, Heidelberg (2007)
  • 11
    • 38149128144 scopus 로고    scopus 로고
    • Known-key distinguishers for some block ciphers
    • Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
    • Knudsen, L.R., Rijmen, V.: Known-key distinguishers for some block ciphers. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 315-324. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 315-324
    • Knudsen, L.R.1    Rijmen, V.2
  • 12
    • 3042644992 scopus 로고    scopus 로고
    • November 2001
    • National Institute of Standards and Technology (NIST). FIPS-197: Advanced Encryption Standard (November 2001), http://csrc.nist.gov/publications/fips/ fips197/fips-197.pdf
    • FIPS-197: Advanced Encryption Standard
  • 14
    • 54249127913 scopus 로고    scopus 로고
    • n) for the xor of two random permutations
    • Safavi-Naini, R, ed, ICITS 2008, Springer, Heidelberg
    • n) for the xor of two random permutations. In: Safavi-Naini, R. (ed.) ICITS 2008. LNCS, vol. 5155, pp. 232-248. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5155 , pp. 232-248
    • Patarin, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.