The new approach of Rijndael key schedule
暂无分享,去创建一个
[1] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[2] Jung Hee Cheon,et al. Improved Impossible Differential Cryptanalysis of Rijndael and Crypton , 2001, ICISC.
[3] William Millan,et al. Strengthening the Key Schedule of the AES , 2002, ACISP.
[4] Zaiton Muda,et al. Key Transformation Approach for Rijndael Security , 2010 .
[5] Raphael C.-W. Phan,et al. Impossible differential cryptanalysis of 7-round Advanced Encryption Standard (AES) , 2004, Inf. Process. Lett..
[6] Vincent Rijmen,et al. The First 10 Years of Advanced Encryption , 2010, IEEE Security & Privacy.
[7] Elaine B. Barker,et al. Report on the Development of the Advanced Encryption Standard (AES) , 2001, Journal of research of the National Institute of Standards and Technology.
[8] Alex Biryukov,et al. Related-Key Cryptanalysis of the Full AES-192 and AES-256 , 2009, ASIACRYPT.
[9] Bruce Schneier,et al. Improved Cryptanalysis of Rijndael , 2000, FSE.
[10] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[11] Marie A. Wright. Feature: The evolution of the Advanced Encryption Standard , 1999 .
[12] Dengguo Feng,et al. New Results on Impossible Differential Cryptanalysis of Reduced AES , 2007, ICISC.