Sciweavers

4 search results - page 1 / 1
» Key Recovery Attacks of Practical Complexity on AES-256 Vari...
Sort
View
EUROCRYPT
2010
Springer
13 years 8 months ago
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitr...
ASIACRYPT
2010
Springer
13 years 1 months ago
Improved Single-Key Attacks on 8-Round AES-192 and AES-256
Abstract. AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks wer...
Orr Dunkelman, Nathan Keller, Adi Shamir
ASIACRYPT
2011
Springer
12 years 3 months ago
Biclique Cryptanalysis of the Full AES
Since Rijndael was chosen as the Advanced Encryption Standard, improving upon 7-round attacks on the 128-bit key variant or upon 8-round attacks on the 192/256-bit key variants has...
Andrey Bogdanov, Dmitry Khovratovich, Christian Re...
FSE
2011
Springer
268views Cryptology» more  FSE 2011»
12 years 7 months ago
Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes
At Eurocrypt 2001, Biryukov and Shamir investigated the security of AES-like ciphers where the substitutions and affine transformations are all key-dependent and successfully crypt...
Julia Borghoff, Lars R. Knudsen, Gregor Leander, S...