메뉴 건너뛰기




Volumn 2384, Issue , 2002, Pages 226-240

Strengthening the key schedule of the AES

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY;

EID: 84866662798     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45450-0_19     Document Type: Conference Paper
Times cited : (35)

References (18)
  • 1
    • 84947444236 scopus 로고    scopus 로고
    • The Block Cipher SQUARE, Fast Software Encryption, Fourth International Workshop, LNCS 1267
    • J. Daemen, L. Knudsen and V. Rijmen. The Block Cipher SQUARE, Fast Software Encryption, Fourth International Workshop, LNCS 1267, Springer-Verlag, 1997, pp 149-165.
    • (1997) Springer-Verlag , pp. 149-165
    • Daemen, J.1    Knudsen, L.2    Rijmen, V.3
  • 2
    • 85006024828 scopus 로고
    • New Types of Cryptanalytic Attacks using Related Keys, Advances in Cryptology–EUROCRYPT’93
    • E. Biham. New Types of Cryptanalytic Attacks using Related Keys, Advances in Cryptology–EUROCRYPT’93, LNCS 765, Springer-Verlag, 1993, pp 398-409.
    • (1993) LNCS 765, Springer-Verlag , pp. 398-409
    • Biham, E.1
  • 4
    • 85088355842 scopus 로고
    • New Potentially Weak Keys for DES and LOKI, Advances in Cryptology–EUROCRYPT’94
    • L. Knudsen. New Potentially Weak Keys for DES and LOKI, Advances in Cryptology–EUROCRYPT’94, LNCS 950, Springer-Verlag, 1994, pp 419-424.
    • (1994) LNCS 950, Springer-Verlag , pp. 419-424
    • Knudsen, L.1
  • 5
    • 21344477994 scopus 로고
    • Cryptanalysis of LOKI91, AUSCRYPT’92
    • L. Knudsen. Cryptanalysis of LOKI91, AUSCRYPT’92, LNCS 718, Springer- Verlag, 1992, pp 196-208.
    • (1992) LNCS 718, Springer- Verlag , pp. 196-208
    • Knudsen, L.1
  • 6
    • 84949229156 scopus 로고
    • A Key-Schedule Weakness in SAFER K-64, Advances in Cryptology– CRYPTO’95
    • L. Knudsen. A Key-Schedule Weakness in SAFER K-64, Advances in Cryptology– CRYPTO’95, LNCS 963, Springer-Verlag, 1995, pp 274-286.
    • (1995) LNCS 963, Springer-Verlag , pp. 274-286
    • Knudsen, L.1
  • 8
    • 84890522850 scopus 로고
    • Communication Theory of Secrecy Systems
    • C.E. Shannon. Communication Theory of Secrecy Systems, Bell System Technical Journal, ol.28, October 1949, pp 656-715.
    • (1949) Bell System Technical Journal, Ol , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 11
    • 84958979426 scopus 로고    scopus 로고
    • The Cipher SHARK, Fast Software Encryption, Third International Workshop, LNCS 1039
    • V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers and E. DeWin. The Cipher SHARK, Fast Software Encryption, Third International Workshop, LNCS 1039, Springer- Verlag, 1996, pp 99-111.
    • (1996) Springer- Verlag , pp. 99-111
    • Rijmen, V.1    Daemen, J.2    Preneel, B.3    Bosselaers, A.4    Dewin, E.5
  • 12
    • 84953635000 scopus 로고
    • Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish), Fast Software Encryption, First International Workshop, LNCS 809
    • B. Schneier. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish), Fast Software Encryption, First International Workshop, LNCS 809, Springer-Verlag, 1993, pp 191-204.
    • (1993) Springer-Verlag , pp. 191-204
    • Schneier, B.1
  • 13
    • 0012055850 scopus 로고    scopus 로고
    • A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis, Workshop on Selected Areas in Cryptography (SAC 2000)
    • K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima and T. Tokita. Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis, Workshop on Selected Areas in Cryptography (SAC 2000), LNCS 2012, pp 39-56.
    • (2012) LNCS , pp. 39-56
    • Aoki, K.1    Ichikawa, T.2    Kanda, M.3    Matsui, M.4    Moriai, S.5    Nakajima, J.6    Camellia, T.T.7
  • 16
    • 84947471290 scopus 로고    scopus 로고
    • Candidate Algorithms for the Advanced Encryption Standard, Third Advanced Encryption Standard Conference
    • L. Bassham. Efficiency Testing of ANSI C Implementations of Round 2 Candidate Algorithms for the Advanced Encryption Standard, Third Advanced Encryption Standard Conference, April 2000. Available at http://csrc.nist.gov/encryption/aes/
    • (2000) Efficiency Testing of ANSI C Implementations of Round , vol.2
    • Bassham, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.