Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds
暂无分享,去创建一个
Alex Biryukov | Adi Shamir | Orr Dunkelman | Nathan Keller | Dmitry Khovratovich | A. Shamir | A. Biryukov | D. Khovratovich | O. Dunkelman | Nathan Keller
[1] Lars R. Knudsen,et al. Cryptanalysis of LOKI91 , 1992, AUSCRYPT.
[2] Eli Biham,et al. Related-Key Boomerang and Rectangle Attacks , 2005, EUROCRYPT.
[3] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[4] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[5] Joan Daemen,et al. AES Proposal : Rijndael , 1998 .
[6] Alex Biryukov,et al. Distinguisher and Related-Key Attack on the Full AES-256 , 2009, CRYPTO.
[7] Gene Tsudik,et al. On simple and secure key distribution , 1993, CCS '93.
[8] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[9] Bruce Schneier,et al. Improved Cryptanalysis of Rijndael , 2000, FSE.
[10] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[11] Eli Biham,et al. New types of cryptanalytic attacks using related keys , 1994, Journal of Cryptology.
[12] Jennifer Seberry,et al. Advances in Cryptology — AUSCRYPT '92 , 1992, Lecture Notes in Computer Science.
[13] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[14] Alex Biryukov,et al. Related-Key Cryptanalysis of the Full AES-192 and AES-256 , 2009, ASIACRYPT.
[15] Erik Tews,et al. Breaking 104 Bit WEP in Less Than 60 Seconds , 2007, WISA.
[16] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[17] Jongsung Kim,et al. Related-Key Rectangle Attacks on Reduced AES-192 and AES-256 , 2007, FSE.