[BOOK][B] The design of Rijndael
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …
Quantum security analysis of AES
In this paper we analyze for the first time the post-quantum security of AES. AES is the most
popular and widely used block cipher, established as the encryption standard by the NIST in …
popular and widely used block cipher, established as the encryption standard by the NIST in …
Subspace trail cryptanalysis and its applications to AES
We introduce subspace trail cryptanalysis, a generalization of invariant subspace
cryptanalysis. With this more generic treatment of subspaces we do no longer rely on …
cryptanalysis. With this more generic treatment of subspaces we do no longer rely on …
Improved key recovery attacks on reduced-round AES with practical data and memory complexities
Determining the security of AES is a central problem in cryptanalysis, but progress in this
area had been slow and only a handful of cryptanalytic techniques led to significant …
area had been slow and only a handful of cryptanalytic techniques led to significant …
Yoyo tricks with AES
In this paper we present new fundamental properties of SPNs. These properties turn out to
be particularly useful in the adaptive chosen ciphertext/plaintext setting and we show this by …
be particularly useful in the adaptive chosen ciphertext/plaintext setting and we show this by …
A robust security scheme based on enhanced symmetric algorithm for MQTT in the Internet of Things
Message Queuing Telemetry Transport (MQTT) is expected to be the de facto messaging IoT
standard. Therefore, MQTT must achieve efficient security. Nevertheless, the most significant …
standard. Therefore, MQTT must achieve efficient security. Nevertheless, the most significant …
Sieve-in-the-middle: improved MITM attacks
This paper presents a new generic technique, named sieve-in-the-middle, which improves
meet-in-the-middle attacks in the sense that it provides an attack on a higher number of …
meet-in-the-middle attacks in the sense that it provides an attack on a higher number of …
Automatic search of attacks on round-reduced AES and applications
In this paper, we describe versatile and powerful algorithms for searching guess-and-
determine and meet-in-the-middle attacks on byte-oriented symmetric primitives. To …
determine and meet-in-the-middle attacks on byte-oriented symmetric primitives. To …
High definition image encryption algorithm based on AES modification
In this article, a high-speed and highly restricted encryption algorithm is proposed to cipher
high-definition (HD) images based on the modified advanced encryption standard (AES) …
high-definition (HD) images based on the modified advanced encryption standard (AES) …
Exhausting Demirci-Selçuk meet-in-the-middle attacks against reduced-round AES
In this paper, we revisit Demirci and Selçuk meet-in-the-middle attacks on AES. We find a
way to automatically model SPN block cipher and meet-in-the-middle attacks that allows to …
way to automatically model SPN block cipher and meet-in-the-middle attacks that allows to …