[BOOK][B] The design of Rijndael

J Daemen, V Rijmen - 2002 - Springer
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …

Quantum security analysis of AES

X Bonnetain, M Naya-Plasencia… - IACR Transactions on …, 2019 - inria.hal.science
In this paper we analyze for the first time the post-quantum security of AES. AES is the most
popular and widely used block cipher, established as the encryption standard by the NIST in …

Subspace trail cryptanalysis and its applications to AES

L Grassi, C Rechberger, S Rønjom - Cryptology ePrint Archive, 2016 - eprint.iacr.org
We introduce subspace trail cryptanalysis, a generalization of invariant subspace
cryptanalysis. With this more generic treatment of subspaces we do no longer rely on …

Improved key recovery attacks on reduced-round AES with practical data and memory complexities

A Bar-On, O Dunkelman, N Keller, E Ronen… - Journal of …, 2020 - Springer
Determining the security of AES is a central problem in cryptanalysis, but progress in this
area had been slow and only a handful of cryptanalytic techniques led to significant …

Yoyo tricks with AES

S Rønjom, NG Bardeh, T Helleseth - … on the Theory and Applications of …, 2017 - Springer
In this paper we present new fundamental properties of SPNs. These properties turn out to
be particularly useful in the adaptive chosen ciphertext/plaintext setting and we show this by …

A robust security scheme based on enhanced symmetric algorithm for MQTT in the Internet of Things

AJ Hintaw, S Manickam, S Karuppayah… - IEEE …, 2023 - ieeexplore.ieee.org
Message Queuing Telemetry Transport (MQTT) is expected to be the de facto messaging IoT
standard. Therefore, MQTT must achieve efficient security. Nevertheless, the most significant …

Sieve-in-the-middle: improved MITM attacks

A Canteaut, M Naya-Plasencia, B Vayssiere - Annual Cryptology …, 2013 - Springer
This paper presents a new generic technique, named sieve-in-the-middle, which improves
meet-in-the-middle attacks in the sense that it provides an attack on a higher number of …

Automatic search of attacks on round-reduced AES and applications

C Bouillaguet, P Derbez, PA Fouque - Annual Cryptology Conference, 2011 - Springer
In this paper, we describe versatile and powerful algorithms for searching guess-and-
determine and meet-in-the-middle attacks on byte-oriented symmetric primitives. To …

High definition image encryption algorithm based on AES modification

SM Wadi, N Zainal - Wireless personal communications, 2014 - Springer
In this article, a high-speed and highly restricted encryption algorithm is proposed to cipher
high-definition (HD) images based on the modified advanced encryption standard (AES) …

Exhausting Demirci-Selçuk meet-in-the-middle attacks against reduced-round AES

P Derbez, PA Fouque - … Workshop, FSE 2013, Singapore, March 11-13 …, 2014 - Springer
In this paper, we revisit Demirci and Selçuk meet-in-the-middle attacks on AES. We find a
way to automatically model SPN block cipher and meet-in-the-middle attacks that allows to …