[BOOK][B] The design of Rijndael

J Daemen, V Rijmen - 2002 - Springer
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …

A pragmatic introduction to secure multi-party computation

D Evans, V Kolesnikov, M Rosulek - Foundations and Trends® …, 2018 - nowpublishers.com
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …

LBlock: a lightweight block cipher

W Wu, L Zhang - Applied Cryptography and Network Security: 9th …, 2011 - Springer
In this paper, we propose a new lightweight block cipher called LBlock. Similar to many
other lightweight block ciphers, the block size of LBlock is 64-bit and the key size is 80-bit …

Biclique cryptanalysis of the full AES

A Bogdanov, D Khovratovich, C Rechberger - Advances in Cryptology …, 2011 - Springer
Since Rijndael was chosen as the Advanced Encryption Standard (AES), improving upon 7-
round attacks on the 128-bit key variant (out of 10 rounds) or upon 8-round attacks on the …

[BOOK][B] Cryptography engineering: design principles and practical applications

N Ferguson, B Schneier, T Kohno - 2011 - books.google.com
The ultimate guide to cryptography, updated from an author team of the world's top
cryptography experts. Cryptography is vital to kee** information safe, in an era when the …

The PHOTON Family of Lightweight Hash Functions

J Guo, T Peyrin, A Poschmann - … , Santa Barbara, CA, USA, August 14-18 …, 2011 - Springer
RFID security is currently one of the major challenges cryptography has to face, often solved
by protocols assuming that an on-tag hash function is available. In this article we present the …

[PDF][PDF] Advanced encryption standard

V Rijmen, J Daemen - … publications, national institute of standards and …, 2001 - jima.me
In the United States, AES was announced by the NIST as US. FIPS PUB 197 (FIPS 197) on
November 26, 2001.[6] This announcement followed a fiveyear standardization process in …

Related-key cryptanalysis of the full AES-192 and AES-256

A Biryukov, D Khovratovich - … 2009: 15th International Conference on the …, 2009 - Springer
In this paper we present two related-key attacks on the full AES. For AES-256 we show the
first key recovery attack that works for all the keys and has 2 99.5 time and data complexity …

LEA: A 128-bit block cipher for fast encryption on common processors

D Hong, JK Lee, DC Kim, D Kwon, KH Ryu… - … Workshop, WISA 2013 …, 2014 - Springer
We propose a new block cipher LEA, which has 128-bit block size and 128, 192, or 256-bit
key size. It provides a high-speed software encryption on general-purpose processors. Our …

Tweaks and Keys for Block Ciphers: The TWEAKEY Framework

J Jean, I Nikolić, T Peyrin - … 2014: 20th International Conference on the …, 2014 - Springer
We propose the TWEAKEY framework with goal to unify the design of tweakable block
ciphers and of block ciphers resistant to related-key attacks. Our framework is simple …