Improved Meet-in-the-Middle Attacks on AES-192 and PRINCE
暂无分享,去创建一个
Keting Jia | Xiaoyun Wang | Leibo Li | Xiaoyun Wang | Keting Jia | Leibo Li
[1] Brian A. Carter,et al. Advanced Encryption Standard , 2007 .
[2] Vincent Rijmen,et al. Improved Impossible Differential Cryptanalysis of 7-Round AES-128 , 2010, INDOCRYPT.
[3] Alex Biryukov,et al. Related-Key Cryptanalysis of the Full AES-192 and AES-256 , 2009, ASIACRYPT.
[4] Shuang Wu,et al. Security Analysis of PRINCE , 2013, FSE.
[5] Andrey Bogdanov,et al. Biclique Cryptanalysis of the Full AES , 2011, ASIACRYPT.
[6] Jiqiang Lu,et al. Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits , 2011, ISPEC.
[7] Jongsung Kim,et al. New Impossible Differential Attacks on AES , 2008, INDOCRYPT.
[8] Jérémy Jean,et al. Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting , 2013, IACR Cryptol. ePrint Arch..
[9] Hüseyin Demirci,et al. Improved Meet-in-the-Middle Attacks on AES , 2009, INDOCRYPT.
[10] Whitfield Diffie,et al. Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard , 1977, Computer.
[11] Adi Shamir,et al. Improved Single-Key Attacks on 8-Round AES-192 and AES-256 , 2010, Journal of Cryptology.
[12] Anne Canteaut,et al. PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract , 2012, ASIACRYPT.
[13] Frederic P. Miller,et al. Advanced Encryption Standard , 2009 .
[14] Ali Aydin Selçuk,et al. A Meet-in-the-Middle Attack on 8-Round AES , 2008, FSE.
[15] Xiaoli Yu,et al. Reflection Cryptanalysis of PRINCE-Like Ciphers , 2013, Journal of Cryptology.
[16] Stefan Lucks,et al. On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis , 2012, IACR Cryptol. ePrint Arch..
[17] Bruce Schneier,et al. Improved Cryptanalysis of Rijndael , 2000, FSE.
[18] Marine Minier,et al. A Collision Attack on 7 Rounds of Rijndael , 2000, AES Candidate Conference.