Transposition of AES Key Schedule
From MaRDI portal
Publication:2980847
DOI10.1007/978-3-319-54705-3_6zbMath1360.94310OpenAlexW2594248124MaRDI QIDQ2980847
Jia-lin Huang, Hailun Yan, Xuejia Lai
Publication date: 5 May 2017
Published in: Information Security and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-54705-3_6
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Revisiting key schedule's diffusion in relation with round function's diffusion
- Meet-in-the-middle attacks on 10-round AES-256
- Improved Single-Key Attacks on 9-Round AES-192/256
- Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- Tweaking AES
- Distinguisher and Related-Key Attack on the Full AES-256
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
- A Meet-in-the-Middle Attack on 8-Round AES
- Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
- Attacking 9 and 10 Rounds of AES-256
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Markov Ciphers and Differential Cryptanalysis
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
- Advanced Encryption Standard – AES
- Related-Key Boomerang and Rectangle Attacks
- Selected Areas in Cryptography
This page was built for publication: Transposition of AES Key Schedule