Sciweavers

AES
2004
Springer
80views Cryptology» more  AES 2004»
13 years 8 months ago
Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES
The best upper bounds on the maximum expected linear probability (MELP) and the maximum expected differential probability
Liam Keliher
AES
2004
Springer
190views Cryptology» more  AES 2004»
13 years 10 months ago
Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results
Abstract. When cryptosystems are being used in real life, hardware and software implementations themselves present a fruitful field for attacks. Side channel attacks exploit infor...
Elena Trichina, Tymur Korkishko, Kyung-Hee Lee
AES
2004
Springer
102views Cryptology» more  AES 2004»
13 years 10 months ago
A Three Rounds Property of the AES
Rijndael is the new Advanced Encryption Standard designed by V. Rijmen and J. Daemen and chosen as AES by the NIST in October 2000. Surprisingly, the number of cryptanalyses agains...
Marine Minier
AES
2004
Springer
142views Cryptology» more  AES 2004»
13 years 10 months ago
Complementation-Like and Cyclic Properties of AES Round Functions
Abstract. While it is known previously that the cycle lengths of individual components of the AES round function are very small, we demonstrate here that the cycle length of the S-...
Tri Van Le, Rüdiger Sparr, Ralph Wernsdorf, Y...
AES
2004
Springer
139views Cryptology» more  AES 2004»
13 years 10 months ago
The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers
This paper is motivated by the design of AES. We consider a broader question of cryptanalysis of block ciphers having very good non-linearity and diffusion. Can we expect anyway, ...
Nicolas Courtois
AES
2004
Springer
151views Cryptology» more  AES 2004»
13 years 10 months ago
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components
This paper is about the design of multivariate public key schemes, as well as block and stream ciphers, in relation to recent attacks that exploit various types of multivariate alg...
Nicolas Courtois
AES
2004
Springer
135views Cryptology» more  AES 2004»
13 years 10 months ago
Some Algebraic Aspects of the Advanced Encryption Standard
Abstract. Since being officially selected as the new Advanced Encryption Standard (AES), Rijndael has continued to receive great attention and has had its security continuously eva...
Carlos Cid
AES
2004
Springer
204views Cryptology» more  AES 2004»
13 years 10 months ago
The Boomerang Attack on 5 and 6-Round Reduced AES
In this note we study security of 128-bit key 10-round AES against the boomerang attack. We show attacks on AES reduced to 5 and 6 rounds, much faster than the exhaustive key searc...
Alex Biryukov
AES
2004
Springer
135views Cryptology» more  AES 2004»
13 years 10 months ago
Linearity of the AES Key Schedule
Frederik Armknecht, Stefan Lucks