[图书][B] The design of Rijndael

J Daemen, V Rijmen - 2002 - Springer
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …

Saturnin: a suite of lightweight symmetric algorithms for post-quantum security

A Canteaut, S Duval, G Leurent, M Naya-Plasencia… - 2019 - inria.hal.science
The cryptographic algorithms needed to ensure the security of our communications have a
cost. For devices with little computing power, whose number is expected to grow significantly …

Improved key recovery attacks on reduced-round AES with practical data and memory complexities

A Bar-On, O Dunkelman, N Keller, E Ronen… - Journal of …, 2020 - Springer
Determining the security of AES is a central problem in cryptanalysis, but progress in this
area had been slow and only a handful of cryptanalytic techniques led to significant …

Truncated boomerang attacks and application to AES-based ciphers

A Bariant, G Leurent - Annual International Conference on the Theory and …, 2023 - Springer
The boomerang attack is a cryptanalysis technique that combines two short differentials
instead of using a single long differential. It has been applied to many primitives, and results …

Mixture differential cryptanalysis: a new approach to distinguishers and attacks on round-reduced AES

L Grassi - IACR Transactions on Symmetric Cryptology, 2018 - tosc.iacr.org
At Eurocrypt 2017 the first secret-key distinguisher for 5-round AES-based on the “multiple-of-
8” property-has been presented. Although it allows to distinguish a random permutation from …

The retracing boomerang attack

O Dunkelman, N Keller, E Ronen, A Shamir - … International Conference on …, 2020 - Springer
Boomerang attacks are extensions of differential attacks, that make it possible to combine
two unrelated differential properties of the first and second part of a cryptosystem with …

The Exchange Attack: How to Distinguish Six Rounds of AES with Chosen Plaintexts

NG Bardeh, S Rønjom - International Conference on the Theory and …, 2019 - Springer
In this paper we present exchange-equivalence attacks which is a new cryptanalytic attack
technique suitable for SPN-like block cipher designs. Our new technique results in the first …

Orthros: a low-latency PRF

S Banik, T Isobe, F Liu, K Minematsu… - IACR Transactions on …, 2021 - tosc.iacr.org
We present Orthros, a 128-bit block pseudorandom function. It is designed with primary
focus on latency of fully unrolled circuits. For this purpose, we adopt a parallel structure …

TNT: how to tweak a block cipher

Z Bao, C Guo, J Guo, L Song - … International Conference on the Theory and …, 2020 - Springer
In this paper, we propose Tweak-aNd-Tweak (TNT TNT for short) mode, which builds a
tweakable block cipher from three independent block ciphers. TNT TNT handles the tweak …

The Retracing Boomerang Attack, with Application to Reduced-Round AES

O Dunkelman, N Keller, E Ronen, A Shamir - Journal of Cryptology, 2024 - Springer
Boomerang attacks are extensions of differential attacks that make it possible to combine
two unrelated differential properties of the first and second part of a cryptosystem with …