Attacking 9 and 10 Rounds of AES-256
From MaRDI portal
Publication:3634483
DOI10.1007/978-3-642-02620-1_5zbMath1307.94053OpenAlexW1585657170MaRDI QIDQ3634483
Ewan Fleischmann, Stefan Lucks, Michael Gorski
Publication date: 25 June 2009
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-02620-1_5
Related Items (3)
Transposition of AES Key Schedule ⋮ The (related-key) impossible boomerang attack and its application to the AES block cipher ⋮ Tweaking AES
Cites Work
- Differential cryptanalysis of DES-like cryptosystems
- New types of cryptanalytic attacks using related keys
- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
- Information Security and Privacy
- Advanced Encryption Standard – AES
- Related-Key Boomerang and Rectangle Attacks
- Fast Software Encryption
- New Related-Key Boomerang Attacks on AES
- Selected Areas in Cryptography
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Attacking 9 and 10 Rounds of AES-256