[图书][B] The design of Rijndael

J Daemen, V Rijmen - 2002 - Springer
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …

Related-key cryptanalysis of the full AES-192 and AES-256

A Biryukov, D Khovratovich - … 2009: 15th International Conference on the …, 2009 - Springer
In this paper we present two related-key attacks on the full AES. For AES-256 we show the
first key recovery attack that works for all the keys and has 2 99.5 time and data complexity …

Distinguisher and related-key attack on the full AES-256

A Biryukov, D Khovratovich, I Nikolić - Annual International Cryptology …, 2009 - Springer
In this paper we construct a chosen-key distinguisher and a related-key attack on the full 256-
bit key AES. We define a notion of differential q-multicollision and show that for AES-256 q …

A meet-in-the-middle attack on 8-round AES

H Demirci, AA Selçuk - … Encryption: 15th International Workshop, FSE 2008 …, 2008 - Springer
We present a 5-round distinguisher for AES. We exploit this distinguisher to develop a meet-
in-the-middle attack on 7 rounds of AES-192 and 8 rounds of AES-256. We also give a time …

Related-key boomerang and rectangle attacks

E Biham, O Dunkelman, N Keller - … on the Theory and Applications of …, 2005 - Springer
The boomerang attack and the rectangle attack are two attacks that utilize differential
cryptanalysis in a larger construction. Both attacks treat the cipher as a cascade of two sub …

Improved single-key attacks on 8-round AES-192 and AES-256

O Dunkelman, N Keller, A Shamir - … on the Theory and Application of …, 2010 - Springer
AES is the most widely used block cipher today, and its security is one of the most important
issues in cryptanalysis. After 13 years of analysis, related-key attacks were recently found …

New impossible differential attacks on AES

J Lu, O Dunkelman, N Keller, J Kim - Progress in Cryptology-INDOCRYPT …, 2008 - Springer
In this paper we apply impossible differential attacks to reduced round AES. Using various
techniques, including the early abort approach and key schedule considerations, we …

Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds

A Biryukov, O Dunkelman, N Keller… - Advances in Cryptology …, 2010 - Springer
AES is the best known and most widely used block cipher. Its three versions (AES-128, AES-
192, and AES-256) differ in their key sizes (128 bits, 192 bits and 256 bits) and in their …

Rotational cryptanalysis of ARX

D Khovratovich, I Nikolić - … : 17th International Workshop, FSE 2010, Seoul …, 2010 - Springer
In this paper we analyze the security of systems based on modular additions, rotations, and
XORs (ARX systems). We provide both theoretical support for their security and practical …

Automatic search for related-key differential characteristics in byte-oriented block ciphers: Application to AES, Camellia, Khazad and others

A Biryukov, I Nikolić - Advances in Cryptology–EUROCRYPT 2010: 29th …, 2010 - Springer
While differential behavior of modern ciphers in a single secret key scenario is relatively well
understood, and simple techniques for computation of security lower bounds are readily …