1. bookVolumen 50 (2011): Edición 1 (December 2011)
    Applied Mathematics and Informatics
Detalles de la revista
License
Formato
Revista
eISSN
1338-9750
ISSN
1210-3195
Primera edición
12 Nov 2012
Calendario de la edición
3 veces al año
Idiomas
Inglés
Acceso abierto

Linear and differential cryptanalysis of reduced-round AES

Publicado en línea: 13 Nov 2012
Volumen & Edición: Volumen 50 (2011) - Edición 1 (December 2011) - Applied Mathematics and Informatics
Páginas: 51 - 61
Detalles de la revista
License
Formato
Revista
eISSN
1338-9750
ISSN
1210-3195
Primera edición
12 Nov 2012
Calendario de la edición
3 veces al año
Idiomas
Inglés

[1] BIHAM, E.: On Matsui’s linear cryptanalysis, in: Advances in Cryptology-EURO-CRYPT ’94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, 1994 (A. De Santis, ed.), Lecture Notes in Comput. Sci., Vol. 950, Springer-Verlag, Berlin, 1995, pp. 341-355.Search in Google Scholar

[2] BIHAM, E.-SHAMIR, A.: Differential cryptanalysis of DES-like cryptosystems, in: Advances in Cryptology-CRYPTO ’90, Conf. on the Theory and Application of Cryptography, Santa Barbara, USA, 1990 (A. Menezes, ed.), Lecture Notes in Comput. Sci., Vol. 537, Springer-Verlag, Berlin, 1991, pp. 2-21.10.1007/3-540-38424-3_1Search in Google Scholar

[3] DAEMEN, J.-RIJMEN, V.: The Design of Rijndael: AES-The Advanced Encryption Standard. Springer-Verlag, Berlin, 2002.10.1007/978-3-662-04722-4_1Search in Google Scholar

[4] HEYS, H. M.: A tutorial on linear and differential cryptanalysis, Technical Report CORR 2001-17, Centre for Applied Cryptographic Research, Department of Combinatorics and Optimization, University of Waterloo, March 2001.Search in Google Scholar

[5] KELIHER, L.: Refined analysis of bounds related to linear and differential and linear cryptanalysis for the AES, in: Advanced Encryption Standard-AES ’04, 4th Internat. Conf. (H. Dobbertin et al., eds.), Bonn, Germany, 2004, Lecture Notes in Comput. Sci., Vol. 3373, Springer-Verlag, Berlin, 2005, pp. 42-57.Search in Google Scholar

[6] KELIHER, L.-SUI, J.: Exact maximum expected differential and linear probability for two-round Advanced Encryption Standard, IET Information Security 1 (2007), 53-57.10.1049/iet-ifs:20060161Search in Google Scholar

[7] LACKO-BARTOˇ SOV´A, L.: ´Utoky na zmenˇsen´e verzie AES. Master Thesis, Faculty of Electrical Engineering and Information Technology, Slovak University of Technology, Bratislava, SK, 2009.Search in Google Scholar

[8] MATSUI, M.: The first experimental cryptanalysis of the Data Encryption Standard, in: Advances in Cryptology-CRYPTO ’94, 14th Annual Internat. Cryptology Conf., Santa Barbara, CA, USA, 1994 (Y. G. Desmedt, ed.), Lecture Notes in Comput. Sci., Vol. 839, Springer-Verlag, Berlin, 1994, pp. 1-11.10.1007/3-540-48658-5_1Search in Google Scholar

[9] MATSUI, M.: Linear cryptanalysis method for DES cipher, in: Advances in Cryptology-EUROCRYPT ’93, Workshop on the Theory and Application of Cryptographic Techniques, Lofthus, Norway, 1993 (T. Helleseth, ed.), Lecture Notes in Comput. Sci., Vol. 765, Springer-Verlag, Berlin, 1994, pp. 386-397.10.1007/3-540-48285-7_33Search in Google Scholar

Artículos recomendados de Trend MD

Planifique su conferencia remota con Sciendo