Efficient design strategies based on the \textsf{AES} round function
From MaRDI portal
Publication:4639487
Recommendations
Cites work
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- AEGIS: a fast authenticated encryption algorithm
- ALE: AES-based lightweight authenticated encryption
- ASC-1: an authenticated encryption stream cipher
- Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers
- Bivium as a mixed-integer linear programming problem
- Comb to pipeline: fast software encryption revisited
- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
- Fast Software Encryption
- Faster and Timing-Attack Resistant AES-GCM
- Improved impossible differential cryptanalysis of 7-round AES-128
- Improved key recovery attacks on reduced-round AES in the single-key setting
- Improved single-key attacks on 9-round AES-192/256
- Leaked-state-forgery attack against the authenticated encryption algorithm ALE
- The Design of a Stream Cipher LEX
- The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE
Cited in
(9)- Differential fault attack on Rocca
- Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for Grøstl
- Variants of the AES key schedule for better truncated differential bounds
- Quantum security analysis of Rocca
- Simpira v2: a family of efficient permutations using the AES round function
- Design Strategies for ARX with Provable Bounds: Sparx and LAX
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function
- Cryptanalysis of Simpira v1
- CBEAM: efficient authenticated encryption from feebly one-way functions
This page was built for publication: Efficient design strategies based on the \textsf{AES} round function
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4639487)