-
1
-
-
24944515451
-
Related-key boomerang and rectangle attacks
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Biham, E., Dunkelman, O., Keller, N.: Related-key boomerang and rectangle attacks. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 507-525. Springer, Heidelberg (2005) (Pubitemid 41313972)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 507-525
-
-
Biham, E.1
Dunkelman, O.2
Keller, N.3
-
2
-
-
24144494187
-
The boomerang attack on 5 and 6-round reduced AES
-
Advanced Encryption Standard - 4th International Conference, AES 2004
-
Biryukov, A.: The Boomerang Attack on 5 and 6-Round Reduced AES. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2005. LNCS, vol. 3373, pp. 11-15. Springer, Heidelberg (2005) (Pubitemid 41230955)
-
(2005)
Lecture Notes in Computer Science
, vol.3373
, pp. 11-15
-
-
Biryukov, A.1
-
3
-
-
72449149100
-
Related-key cryptanalysis of the full AES-192 and AES-256
-
Matsui, M. (ed.), Springer, Heidelberg
-
Biryukov, A., Khovratovich, D.: Related-key cryptanalysis of the full AES-192 and AES-256. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 1-18. Springer, Heidelberg (2009)
-
(2009)
ASIACRYPT 2009. LNCS
, vol.5912
, pp. 1-18
-
-
Biryukov, A.1
Khovratovich, D.2
-
4
-
-
70350346078
-
Distinguisher and related-key attack on the full AES-256
-
Halevi, S. (ed.), Springer, Heidelberg
-
Biryukov, A., Khovratovich, D., Nikolíc, I.: Distinguisher and related-key attack on the full AES-256. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 231-249. Springer, Heidelberg (2009)
-
(2009)
CRYPTO 2009. LNCS
, vol.5677
, pp. 231-249
-
-
Biryukov, A.1
Khovratovich, D.2
Nikolíc, I.3
-
5
-
-
77954646661
-
Automatic search for related-key differential characteristics in byte-oriented block ciphers: Application to AES, Camellia, Khazad and others
-
Gilbert, H. (ed.), Springer, Heidelberg
-
Biryukov, A., Nikolíc, I.: Automatic search for related-key differential characteristics in byte-oriented block ciphers: Application to AES, Camellia, Khazad and others. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 322-344. Springer, Heidelberg (2010)
-
(2010)
EUROCRYPT 2010. LNCS
, vol.6110
, pp. 322-344
-
-
Biryukov, A.1
Nikolíc, I.2
-
7
-
-
50249150254
-
A meet-in-the-middle attack on 8-round AES
-
Nyberg, K. (ed.), Springer, Heidelberg
-
Demirci, H., Seļcuk, A.A.: A meet-in-the-middle attack on 8-round AES. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 116-126. Springer, Heidelberg (2008)
-
(2008)
FSE 2008. LNCS
, vol.5086
, pp. 116-126
-
-
Demirci, H.1
Seļcuk, A.A.2
-
8
-
-
84974678303
-
Improved Cryptanalysis of Rijndael
-
Fast Software Encryption
-
Ferguson, N., Kelsey, J., Lucks, S., Schneier, B., Stay, M., Wagner, D., Whiting, D.: Improved cryptanalysis of rijndael. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 213-230. Springer, Heidelberg (2001) (Pubitemid 33236951)
-
(2001)
Lecture Notes in Computer Science
, Issue.1978
, pp. 213-230
-
-
Ferguson, N.1
Kelsey, J.2
Lucks, S.3
Schneier, B.4
Stay, M.5
Wagner, D.6
Whiting, D.7
-
9
-
-
70350657143
-
Attacking 9 and 10 rounds of AES-256
-
Boyd, C., Gonźalez Nieto, J. (eds.), Springer, Heidelberg
-
Fleischmann, E., Gorski, M., Lucks, S.: Attacking 9 and 10 rounds of AES-256. In: Boyd, C., Gonźalez Nieto, J. (eds.) ACISP 2009. LNCS, vol. 5594, pp. 60-72. Springer, Heidelberg (2009)
-
(2009)
ACISP 2009. LNCS
, vol.5594
, pp. 60-72
-
-
Fleischmann, E.1
Gorski, M.2
Lucks, S.3
-
10
-
-
12444346059
-
A collision attack on 7 rounds of Rijndael
-
Gilbert, H., Minier, M.: A collision attack on 7 rounds of Rijndael. In: AES Candidate Conference, pp. 230-241 (2000)
-
(2000)
AES Candidate Conference
, pp. 230-241
-
-
Gilbert, H.1
Minier, M.2
-
11
-
-
70350373481
-
Intel's new AES instructions for enhanced performance and security
-
Dunkelman, O. (ed.), Springer, Heidelberg
-
Gueron, S.: Intel's new AES instructions for enhanced performance and security. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol. 5665, pp. 51-66. Springer, Heidelberg (2009)
-
(2009)
FSE 2009. LNCS
, vol.5665
, pp. 51-66
-
-
Gueron, S.1
-
12
-
-
38149085478
-
Related-key rectangle attacks on reduced AES-192 and AES-256
-
Biryukov, A. (ed.), Springer, Heidelberg
-
Kim, J., Hong, S., Preneel, B.: Related-key rectangle attacks on reduced AES-192 and AES-256. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 225-241. Springer, Heidelberg (2007)
-
(2007)
FSE 2007. LNCS
, vol.4593
, pp. 225-241
-
-
Kim, J.1
Hong, S.2
Preneel, B.3
-
13
-
-
58549091917
-
New impossible differential attacks on AES
-
Chowdhury, D.R., Rijmen, V., Das, A. (eds.), Springer, Heidelberg
-
Lu, J., Dunkelman, O., Keller, N., Kim, J.: New impossible differential attacks on AES. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 279-293. Springer, Heidelberg (2008)
-
(2008)
INDOCRYPT 2008. LNCS
, vol.5365
, pp. 279-293
-
-
Lu, J.1
Dunkelman, O.2
Keller, N.3
Kim, J.4
-
14
-
-
84866662798
-
Strengthening the key schedule of the AES
-
Batten, L.M., Seberry, J. (eds.), Springer, Heidelberg
-
May, L., Henricksen, M., Millan, W., Carter, G., Dawson, E.: Strengthening the key schedule of the AES. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol. 2384, pp. 226-240. Springer, Heidelberg (2002)
-
(2002)
ACISP 2002. LNCS
, vol.2384
, pp. 226-240
-
-
May, L.1
Henricksen, M.2
Millan, W.3
Carter, G.4
Dawson, E.5
-
15
-
-
0003508558
-
Advanced encryption standard (AES)
-
National Institute of Standards and Technology, November
-
National Institute of Standards and Technology. Advanced encryption standard (AES). FIPS 197 (November 2001)
-
(2001)
FIPS
, vol.197
-
-
|