Practical Attacks on Reduced-Round AES

Author:

Bardeh Navid Ghaedi,Rønjom Sondre

Publisher

Springer International Publishing

Reference16 articles.

1. Bar-On, A., Dunkelman, O., Keller, N., Ronen, E., Shamir, A.: Improved key recovery attacks on reduced-round AES with practical data and memory complexities. In: Advances in Cryptology - CRYPTO 2018–38th Annual International Cryptology Conference, Santa Barbara, CA, USA, 19–23 August 2018, Proceedings, Part II, pp. 185–212 (2018). https://doi.org/10.1007/978-3-319-96881-0_7

2. Biryukov, A., Khovratovich, D.: Related-key cryptanalysis of the full AES-192 and AES-256. In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, 6–10 December 2009, Proceedings, pp. 1–18 (2009). https://doi.org/10.1007/978-3-642-10366-7_1

3. Biryukov, A., Khovratovich, D., Nikolic, I.: Distinguisher and related-key attack on the full AES-256. In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, 16–20 August 2009, Proceedings, pp. 231–249 (2009). https://doi.org/10.1007/978-3-642-03356-8_14

4. Bouillaguet, C., Derbez, P., Dunkelman, O., Fouque, P., Keller, N., Rijmen, V.: Low-data complexity attacks on AES. IEEE Trans. Inf. Theor. 58(11), 7002–7017 (2012). https://doi.org/10.1109/TIT.2012.2207880

5. Daemen, J., Rijmen, V.: The block cipher rijndael. In: Smart Card Research and Applications, This International Conference, CARDIS 1998, Louvain-la-Neuve, Belgium, 14–16 September 1998, Proceedings, pp. 277–284 (1998). https://doi.org/10.1007/10721064_26

Cited by 14 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Yoyo attack on 4-round Lai-Massey scheme with secret round functions;Designs, Codes and Cryptography;2024-05-03

2. Lower data attacks on Advanced Encryption Standard;Turkish Journal of Electrical Engineering and Computer Sciences;2024-03-14

3. Higher-Order Mixture Differentials for AES-Based Block Ciphers and Applications to TweAES;Lecture Notes in Computer Science;2024

4. Security Verification of Low-Trust Architectures;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15

5. New Security Proofs and Complexity Records for Advanced Encryption Standard;IEEE Access;2023

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3