Efficient Design Strategies Based on the AES Round Function
From MaRDI portal
Publication:4639487
DOI10.1007/978-3-662-52993-5_17zbMath1387.94085OpenAlexW2486115487MaRDI QIDQ4639487
Publication date: 9 May 2018
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-52993-5_17
Related Items (6)
Pholkos -- efficient large-state tweakable block ciphers from the AES round function ⋮ Quantum security analysis of Rocca ⋮ Design Strategies for ARX with Provable Bounds: Sparx and LAX ⋮ Cryptanalysis of Simpira v1 ⋮ Variants of the AES key schedule for better truncated differential bounds ⋮ Differential fault attack on Rocca
Uses Software
Cites Work
- Unnamed Item
- Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE
- ASC-1: An Authenticated Encryption Stream Cipher
- Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers
- ALE: AES-Based Lightweight Authenticated Encryption
- Improved Single-Key Attacks on 9-Round AES-192/256
- Comb to Pipeline: Fast Software Encryption Revisited
- The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE
- AEGIS: A Fast Authenticated Encryption Algorithm
- Improved Impossible Differential Cryptanalysis of 7-Round AES-128
- Faster and Timing-Attack Resistant AES-GCM
- Bivium as a Mixed-Integer Linear Programming Problem
- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
- The Design of a Stream Cipher LEX
- Fast Software Encryption
This page was built for publication: Efficient Design Strategies Based on the AES Round Function