Author:
Kim Jongsung,Hong Seokhie,Preneel Bart
Publisher
Springer Berlin Heidelberg
Reference32 articles.
1. Lecture Notes in Computer Science;E. Biham,1991
2. Biham, E.: New Types of Cryptanalytic Attacks Using Related Keys. Journal of Cryptology 7(4), 229–246 (1994)
3. Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. Journal of Cryptology 18(4), 291–311 (2005)
4. Biham, E., Keller, N.: Cryptanalysis of Reduced Variants of Rijndael,
http://csrc.nist.gov/encryption/aes/round2/conf3/aes3papers.html
5. Lecture Notes in Computer Science;E. Biham,2001
Cited by
36 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Differential Meet-In-The-Middle Cryptanalysis;Advances in Cryptology – CRYPTO 2023;2023
2. When Messages Are Keys: Is HMAC a Dual-PRF?;Advances in Cryptology – CRYPTO 2023;2023
3. New results in SAT – cryptanalysis of the AES;2022 IEEE 16th International Scientific Conference on Informatics (Informatics);2022-11-23
4. Revisiting Related-Key Boomerang Attacks on AES Using Computer-Aided Tool;Advances in Cryptology – ASIACRYPT 2022;2022
5. Impact of Computational Power on Cryptography;Multimedia Security;2021