Author:
Kumar Gupta Sunny,Ghosh Mohona,Mohanty Sraban Kumar
Reference13 articles.
1. Akshima CD, Ghosh M, Goel A, Sanadhya SK (2015) Single key recovery attacks on 9-round kalyna-128/256 and kalyna-256/512. In: Kwon S, Yun A (eds) Information security and cryptology - ICISC 2015 - 18th international conference, Seoul, South Korea, 25–27 November 2015, Revised Selected Papers. Lecture notes in computer science, vol 9558. Springer, pp 119–135. 10.1007/978-3-319-30840-1, https://doi.org/10.1007/978-3-319-30840-1
2. AlTawy R, Abdelkhalek A, Youssef AM (2016) A meet-in-the-middle attack on reduced-round kalyna-b/2b. IEICE Trans Inf Syst 99(4):1246–1250
3. Daemen J, Rijmen V (2002) The design of Rijndael: AES - the advanced encryption standard. Springer
4. Demirci H, Selçuk AA (2008) A meet-in-the-middle attack on 8-round AES. In: Nyberg K
5. (ed) Fast software encryption, 15th international workshop, FSE 2008, Lausanne, Switzerland, 10-13 February 2008, Revised Selected Papers. Lecture notes in computer science, vol 5086. Springer, pp 116-126
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Side-Channeling the Kalyna Key Expansion;Topics in Cryptology – CT-RSA 2022;2022