-
1
-
-
85006024828
-
New Types of Cryptanalytic Attacks Using Related Keys
-
Helleseth, T. (ed.) EUROCRYPT 1993. Springer, Heidelberg
-
Biham, E.: New Types of Cryptanalytic Attacks Using Related Keys. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 398-409. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 398-409
-
-
Biham, E.1
-
2
-
-
24944515451
-
Related-Key Boomerang and Rectangle Attacks
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Biham, E., Dunkelman, O., Keller, N.: Related-Key Boomerang and Rectangle Attacks. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 507-525. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 507-525
-
-
Biham, E.1
Dunkelman, O.2
Keller, N.3
-
3
-
-
72449149100
-
Related-Key Cryptanalysis of the Full AES-192 and AES-256
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Biryukov, A., Khovratovich, D.: Related-Key Cryptanalysis of the Full AES-192 and AES-256. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 1-18. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 1-18
-
-
Biryukov, A.1
Khovratovich, D.2
-
4
-
-
70350346078
-
Distinguisher and Related-Key Attack on the Full AES-256
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Biryukov, A., Khovratovich, D., Nikolić, I.: Distinguisher and Related-Key Attack on the Full AES-256. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 231-249. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 231-249
-
-
Biryukov, A.1
Khovratovich, D.2
Nikolić, I.3
-
5
-
-
77951731744
-
-
IACR eprint server, 2009/374 (July)
-
Biryukov, A., Dunkelman, O., Keller, N., Khovratovich, D., Shamir, A.: Key Recovery Attacks of Practical Complexity on AES Variant with Up To 10 Rounds, IACR eprint server, 2009/374 (July 2009), http://eprint.iacr.org/2009/ 374
-
(2009)
Key Recovery Attacks of Practical Complexity on AES Variant with Up to 10 Rounds
-
-
Biryukov, A.1
Dunkelman, O.2
Keller, N.3
Khovratovich, D.4
Shamir, A.5
-
6
-
-
84957610784
-
Slide attacks
-
Knudsen, L.R. (ed.) FSE 1999. Springer, Heidelberg
-
Biryukov, A., Wagner, D.: Slide attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 245-259. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1636
, pp. 245-259
-
-
Biryukov, A.1
Wagner, D.2
-
7
-
-
84948988609
-
Advanced Slide Attacks
-
Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Biryukov, A., Wagner, D.: Advanced Slide Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 589-606. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 589-606
-
-
Biryukov, A.1
Wagner, D.2
-
9
-
-
84974678303
-
Improved Cryptanalysis of Rijndael
-
Schneier, B. (ed.) FSE 2000. Springer, Heidelberg
-
Ferguson, N., Kelsey, J., Lucks, S., Schneier, B., Stay, M., Wagner, D., Whiting, D.: Improved Cryptanalysis of Rijndael. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 213-230. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.1978
, pp. 213-230
-
-
Ferguson, N.1
Kelsey, J.2
Lucks, S.3
Schneier, B.4
Stay, M.5
Wagner, D.6
Whiting, D.7
-
10
-
-
77956996397
-
-
IACR eprint server, 2010/019 (January)
-
Kim, J., Hong, S., Preneel, B., Biham, E., Dunkelman, O., Keller, N.: Related-Key Boomerang and Rectangle Attacks, IACR eprint server, 2010/019 (January 2010), http://eprint.iacr.org/2010/019
-
(2010)
Related-Key Boomerang and Rectangle Attacks
-
-
Kim, J.1
Hong, S.2
Preneel, B.3
Biham, E.4
Dunkelman, O.5
Keller, N.6
-
11
-
-
84866662798
-
Strengthening the Key Schedule of the AES
-
Batten, L.M., Seberry, J. (eds.) ACISP 2002. Springer, Heidelberg
-
May, L., Henricksen, M., Millan, W., Carter, G., Dawson, E.: Strengthening the Key Schedule of the AES. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol. 2384, pp. 226-240. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2384
, pp. 226-240
-
-
May, L.1
Henricksen, M.2
Millan, W.3
Carter, G.4
Dawson, E.5
-
12
-
-
24144483054
-
Efficient AES Implementations on ASICs and FPGAs
-
Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2005. Springer, Heidelberg
-
Pramstaller, N., Mangard, S., Dominikus, S., Wolkerstorfer, J.: Efficient AES Implementations on ASICs and FPGAs. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2005. LNCS, vol. 3373, pp. 98-112. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3373
, pp. 98-112
-
-
Pramstaller, N.1
Mangard, S.2
Dominikus, S.3
Wolkerstorfer, J.4
-
13
-
-
84946832086
-
A Compact Rijndael Hardware Architecture with S-Box Optimization
-
Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
-
Satoh, A., Morioka, S., Munetoh, S.: A Compact Rijndael Hardware Architecture with S-Box Optimization. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 239-254. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 239-254
-
-
Satoh, A.1
Morioka, S.2
Munetoh, S.3
-
14
-
-
79958807223
-
-
Virtual Silicon Inc. Part Number: UMCL18G212T3, Process: UMC Logic 0.18 μm Generic II Technology: 0.18μm (July)
-
Virtual Silicon Inc. 0.18 μm VIP Standard Cell Library Tape Out Ready, Part Number: UMCL18G212T3, Process: UMC Logic 0.18 μm Generic II Technology: 0.18μm (July 2004)
-
(2004)
0.18 μM VIP Standard Cell Library Tape out Ready
-
-
-
15
-
-
84945126868
-
The Boomerang Attack
-
Knudsen, L.R. (ed.) FSE 1999. Springer, Heidelberg
-
Wagner, D.: The Boomerang Attack. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 156-170. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1636
, pp. 156-170
-
-
Wagner, D.1
-
16
-
-
84944065737
-
Related-Cipher Attacks
-
Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. Springer, Heidelberg
-
Wu, H.: Related-Cipher Attacks. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol. 2513, pp. 447-455. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2513
, pp. 447-455
-
-
Wu, H.1
|