Selected Areas in Cryptography
From MaRDI portal
Publication:5713958
DOI10.1007/b96837zbMath1081.94527OpenAlexW2501607630MaRDI QIDQ5713958
Goce Jakimoski, Yvo G. Desmedt
Publication date: 27 December 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b96837
Related Items (16)
Permutation code encryption—New achievement based on path encryption ⋮ Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis ⋮ Related-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M3 ⋮ Improving the Biclique Cryptanalysis of AES ⋮ Security analysis of SIMECK block cipher against related-key impossible differential ⋮ A Unified Approach to Related-Key Attacks ⋮ A Meet-in-the-Middle Attack on 8-Round AES ⋮ Transposition of AES Key Schedule ⋮ Improved Impossible Differential Attacks on Large-Block Rijndael ⋮ New Results on Impossible Differential Cryptanalysis of Reduced AES ⋮ Notions and relations for RKA-secure permutation and function families ⋮ The (related-key) impossible boomerang attack and its application to the AES block cipher ⋮ Related-Key Differential-Linear Attacks on Reduced AES-192 ⋮ Attacking 9 and 10 Rounds of AES-256 ⋮ Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia ⋮ New Related-Key Boomerang Attacks on AES
This page was built for publication: Selected Areas in Cryptography