Cryptanalysis of AES and Camellia with related S-boxes
From MaRDI portal
Publication:4924682
Recommendations
Cited in
(16)- Plaintext recovery in DES-like cryptosystems based on S-boxes with embedded parity check
- Cryptanalysis of PRESENT-like ciphers with secret S-boxes
- Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes
- Cryptographic properties of modified AES-like S-boxes
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- scientific article; zbMATH DE number 5544831 (Why is no real title available?)
- Cryptanalysis of C2
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- A simple power analysis attack against the key schedule of the Camellia block cipher
- Security of the AES with a secret S-box
- Toward reverse engineering on secret \(S\)-boxes in block ciphers
- Experimental verification of super-Sbox analysis -- confirmation of detailed attack complexity
- scientific article; zbMATH DE number 1722688 (Why is no real title available?)
- On some probabilistic approximations for AES-like S-boxes
- Security analysis of S-boxes in symmetric ciphers
- Advanced Encryption Standard – AES
This page was built for publication: Cryptanalysis of AES and Camellia with related S-boxes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4924682)