The effects of the omission of last round's MixColumns on AES
From MaRDI portal
Publication:991791
DOI10.1016/J.IPL.2010.02.007zbMATH Open1209.68216OpenAlexW2100739355MaRDI QIDQ991791FDOQ991791
Authors: Orr Dunkelman, Nathan Keller
Publication date: 7 September 2010
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2010.02.007
Recommendations
- Improved single-key attacks on 8-round AES-192 and AES-256
- Improved single-key attacks on 8-round AES-192 and AES-256
- Linear and differential cryptanalysis of reduced-round AES
- Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
- Practical attacks on reduced-round AES
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- A Meet-in-the-Middle Attack on 8-Round AES
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- New Impossible Differential Attacks on AES
- Impossible differential cryptanalysis of 7-round advanced encryption standard (AES)
- New Results on Impossible Differential Cryptanalysis of Reduced AES
- The effects of the omission of last round's MixColumns on AES
Cited In (7)
- New slide attacks on almost self-similar ciphers
- Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE
- The effects of the omission of last round's MixColumns on AES
- ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES
- New representations of the AES key schedule
- New representations of the AES key schedule
- Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool
This page was built for publication: The effects of the omission of last round's MixColumns on AES
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q991791)