Tweaking AES
From MaRDI portal
Publication:3084255
DOI10.1007/978-3-642-19574-7_14zbMath1293.94091OpenAlexW4250054602MaRDI QIDQ3084255
Publication date: 15 March 2011
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19574-7_14
Related Items
Improved Top-Down Techniques in Differential Cryptanalysis, Transposition of AES Key Schedule, Variants of the AES key schedule for better truncated differential bounds, The resistance of PRESENT-80 against related-key differential attacks
Uses Software
Cites Work
- Distinguisher and Related-Key Attack on the Full AES-256
- Intel’s New AES Instructions for Enhanced Performance and Security
- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
- A Meet-in-the-Middle Attack on 8-Round AES
- Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
- Attacking 9 and 10 Rounds of AES-256
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Advanced Encryption Standard – AES
- Related-Key Boomerang and Rectangle Attacks
- New Impossible Differential Attacks on AES
- Unnamed Item
- Unnamed Item
- Unnamed Item