[图书][B] The design of Rijndael
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …
Saturnin: a suite of lightweight symmetric algorithms for post-quantum security
The cryptographic algorithms needed to ensure the security of our communications have a
cost. For devices with little computing power, whose number is expected to grow significantly …
cost. For devices with little computing power, whose number is expected to grow significantly …
Improved key recovery attacks on reduced-round AES with practical data and memory complexities
Determining the security of AES is a central problem in cryptanalysis, but progress in this
area had been slow and only a handful of cryptanalytic techniques led to significant …
area had been slow and only a handful of cryptanalytic techniques led to significant …
Truncated boomerang attacks and application to AES-based ciphers
The boomerang attack is a cryptanalysis technique that combines two short differentials
instead of using a single long differential. It has been applied to many primitives, and results …
instead of using a single long differential. It has been applied to many primitives, and results …
Mixture differential cryptanalysis: a new approach to distinguishers and attacks on round-reduced AES
L Grassi - IACR Transactions on Symmetric Cryptology, 2018 - tosc.iacr.org
At Eurocrypt 2017 the first secret-key distinguisher for 5-round AES-based on the “multiple-of-
8” property-has been presented. Although it allows to distinguish a random permutation from …
8” property-has been presented. Although it allows to distinguish a random permutation from …
The retracing boomerang attack
Boomerang attacks are extensions of differential attacks, that make it possible to combine
two unrelated differential properties of the first and second part of a cryptosystem with …
two unrelated differential properties of the first and second part of a cryptosystem with …
The Exchange Attack: How to Distinguish Six Rounds of AES with Chosen Plaintexts
NG Bardeh, S Rønjom - International Conference on the Theory and …, 2019 - Springer
In this paper we present exchange-equivalence attacks which is a new cryptanalytic attack
technique suitable for SPN-like block cipher designs. Our new technique results in the first …
technique suitable for SPN-like block cipher designs. Our new technique results in the first …
Orthros: a low-latency PRF
We present Orthros, a 128-bit block pseudorandom function. It is designed with primary
focus on latency of fully unrolled circuits. For this purpose, we adopt a parallel structure …
focus on latency of fully unrolled circuits. For this purpose, we adopt a parallel structure …
TNT: how to tweak a block cipher
In this paper, we propose Tweak-aNd-Tweak (TNT TNT for short) mode, which builds a
tweakable block cipher from three independent block ciphers. TNT TNT handles the tweak …
tweakable block cipher from three independent block ciphers. TNT TNT handles the tweak …
The Retracing Boomerang Attack, with Application to Reduced-Round AES
Boomerang attacks are extensions of differential attacks that make it possible to combine
two unrelated differential properties of the first and second part of a cryptosystem with …
two unrelated differential properties of the first and second part of a cryptosystem with …