Variants of the AES key schedule for better truncated differential bounds
From MaRDI portal
Publication:1726661
DOI10.1007/978-3-030-10970-7_2zbMath1447.94031OpenAlexW2910464690MaRDI QIDQ1726661
Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin, Jérémy Jean
Publication date: 20 February 2019
Full work available at URL: https://doi.org/10.1007/978-3-030-10970-7_2
Related Items (2)
Weak-key distinguishers for AES ⋮ Constructing and deconstructing intentional weaknesses in symmetric ciphers
Cites Work
- Unnamed Item
- Unnamed Item
- Optimization by Simulated Annealing
- Thermodynamical approach to the travelling salesman problem: An efficient simulation algorithm
- Differential cryptanalysis of DES-like cryptosystems
- How to use metaheuristics for design of symmetric-key primitives
- Revisiting AES related-key differential attacks with constraint programming
- Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Tweaking AES
- Distinguisher and Related-Key Attack on the Full AES-256
- Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- Efficient Design Strategies Based on the AES Round Function
This page was built for publication: Variants of the AES key schedule for better truncated differential bounds