메뉴 건너뛰기




Volumn 6110 LNCS, Issue , 2010, Pages 299-319

Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds

Author keywords

[No Author keywords available]

Indexed keywords

BLOCK CIPHERS; EXHAUSTIVE SEARCH; KEY RECOVERY ATTACKS; KEY SIZES; LOW COMPLEXITY; SAFETY MARGIN;

EID: 77954648187     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13190-5_15     Document Type: Conference Paper
Times cited : (88)

References (13)
  • 1
    • 0028494723 scopus 로고
    • New Types of Cryptanalytic Attacks Using Related Keys
    • Biham, E.: New Types of Cryptanalytic Attacks Using Related Keys. J. Cryptology 7(4), 229-246 (1994)
    • (1994) J. Cryptology , vol.7 , Issue.4 , pp. 229-246
    • Biham, E.1
  • 2
    • 24944515451 scopus 로고    scopus 로고
    • Related-key boomerang and rectangle attacks
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Biham, E., Dunkelman, O., Keller, N.: Related-Key Boomerang and Rectangle Attacks. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 507-525. Springer, Heidelberg (2005) (Pubitemid 41313972)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 507-525
    • Biham, E.1    Dunkelman, O.2    Keller, N.3
  • 3
    • 72449149100 scopus 로고    scopus 로고
    • Related-Key Cryptanalysis of the Full AES-192 and AES-256
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Biryukov, A., Khovratovich, D.: Related-Key Cryptanalysis of the Full AES-192 and AES-256. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 1-18. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 1-18
    • Biryukov, A.1    Khovratovich, D.2
  • 4
    • 70350346078 scopus 로고    scopus 로고
    • Distinguisher and Related-Key Attack on the Full AES-256
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Biryukov, A., Khovratovich, D., Nikolic, I.: Distinguisher and Related-Key Attack on the Full AES-256. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 231-249. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 231-249
    • Biryukov, A.1    Khovratovich, D.2    Nikolic, I.3
  • 7
    • 84974678303 scopus 로고    scopus 로고
    • Improved Cryptanalysis of Rijndael
    • Schneier, B. (ed.) FSE 2000. Springer, Heidelberg
    • Ferguson, N., Kelsey, J., Lucks, S., Schneier, B., Stay, M., Wagner, D., Whiting, D.: Improved Cryptanalysis of Rijndael. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 213-230. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.1978 , pp. 213-230
    • Ferguson, N.1    Kelsey, J.2    Lucks, S.3    Schneier, B.4    Stay, M.5    Wagner, D.6    Whiting, D.7
  • 8
    • 84949223752 scopus 로고    scopus 로고
    • Weaknesses in the Key Scheduling Algorithm of RC4
    • Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. Springer, Heidelberg
    • Fluhrer, S.R., Mantin, I., Shamir, A.: Weaknesses in the Key Scheduling Algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1-24. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2259 , pp. 1-24
    • Fluhrer, S.R.1    Mantin, I.2    Shamir, A.3
  • 9
    • 38149085478 scopus 로고    scopus 로고
    • Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
    • Biryukov, A. (ed.) FSE 2007. Springer, Heidelberg
    • Kim, J., Hong, S., Preneel, B.: Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 225-241. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4593 , pp. 225-241
    • Kim, J.1    Hong, S.2    Preneel, B.3
  • 10
    • 35048892576 scopus 로고
    • Cryptanalysis of LOKI91
    • Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. Springer, Heidelberg
    • Knudsen, L.R.: Cryptanalysis of LOKI91. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 196-208. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.718 , pp. 196-208
    • Knudsen, L.R.1
  • 12
    • 38549101578 scopus 로고    scopus 로고
    • Breaking 104 bit WEP in less than 60 seconds
    • Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. Springer, Heidelberg
    • Tews, E., Weinmann, R.-P., Pyshkin, A.: Breaking 104 bit WEP in less than 60 seconds. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, vol. 4867, pp. 188-202. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4867 , pp. 188-202
    • Tews, E.1    Weinmann, R.-P.2    Pyshkin, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.