136
click to vote
FSE
15 years 10 months ago
2010 Springer
In this paper, we improve the recent rebound and start-from-the-middle attacks on AES-like permutations. Our new cryptanalysis technique uses the fact that one can view two rounds ...
107
Voted
FSE
15 years 10 months ago
2010 Springer 147
Voted
FSE
15 years 10 months ago
2010 Springer
This paper presents new software speed records for AES-128 encryption for architectures at both ends of the performance spectrum. On the one side we target the low-end 8-bit AVR mi...
102
Voted
FSE
15 years 10 months ago
2010 Springer |