Advanced Encryption Standard – AES
From MaRDI portal
Publication:5316679
DOI10.1007/b137765zbMath1117.94325OpenAlexW2901686839MaRDI QIDQ5316679
Rüdiger Sparr, Tri van le, Ralph Wernsdorf, Yvo G. Desmedt
Publication date: 14 September 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b137765
Related Items (12)
Improved Analysis of ECHO-256 ⋮ On the resilience of Even-Mansour to invariant permutations ⋮ Weak-key distinguishers for AES ⋮ Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials ⋮ Rotational differential-linear cryptanalysis revisited ⋮ Nonlinear Invariant Attack ⋮ Constructing and deconstructing intentional weaknesses in symmetric ciphers ⋮ Almost universal forgery attacks on AES-based MAC's ⋮ Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function ⋮ Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64 ⋮ Group theoretic properties of Rijndael-like ciphers ⋮ Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3 512
This page was built for publication: Advanced Encryption Standard – AES