Advanced Encryption Standard – AES 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers / [electronic resource] :
edited by Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa.
- Berlin, Heidelberg : Springer Berlin Heidelberg, 2005.
- X, 190 p. online resource.
- Lecture Notes in Computer Science, 3373 0302-9743 ; .
- Lecture Notes in Computer Science, 3373 .
Cryptanalytic Attacks and Related Results -- The Cryptanalysis of the AES – A Brief Survey -- The Boomerang Attack on 5 and 6-Round Reduced AES -- A Three Rounds Property of the AES -- DFA on AES -- Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES -- Algebraic Attacks and Related Results -- Some Algebraic Aspects of the Advanced Encryption Standard -- General Principles of Algebraic Attacks and New Design Criteria for Cipher Components -- An Algebraic Interpretation of 128 -- Hardware Implementations -- Efficient AES Implementations on ASICs and FPGAs -- Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results -- Other Topics -- Complementation-Like and Cyclic Properties of AES Round Functions -- More Dual Rijndaels -- Representations and Rijndael Descriptions -- Linearity of the AES Key Schedule -- The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers.
9783540318408
10.1007/b137765 doi
Computer science.
Data encryption (Computer science).
Computer software.
Computational complexity.
Algebra--Data processing.
Algorithms.
Computer Science.
Data Encryption.
Algorithm Analysis and Problem Complexity.
Symbolic and Algebraic Manipulation.
Discrete Mathematics in Computer Science.
Algorithms.
QA76.9.A25
005.82
Cryptanalytic Attacks and Related Results -- The Cryptanalysis of the AES – A Brief Survey -- The Boomerang Attack on 5 and 6-Round Reduced AES -- A Three Rounds Property of the AES -- DFA on AES -- Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES -- Algebraic Attacks and Related Results -- Some Algebraic Aspects of the Advanced Encryption Standard -- General Principles of Algebraic Attacks and New Design Criteria for Cipher Components -- An Algebraic Interpretation of 128 -- Hardware Implementations -- Efficient AES Implementations on ASICs and FPGAs -- Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results -- Other Topics -- Complementation-Like and Cyclic Properties of AES Round Functions -- More Dual Rijndaels -- Representations and Rijndael Descriptions -- Linearity of the AES Key Schedule -- The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers.
9783540318408
10.1007/b137765 doi
Computer science.
Data encryption (Computer science).
Computer software.
Computational complexity.
Algebra--Data processing.
Algorithms.
Computer Science.
Data Encryption.
Algorithm Analysis and Problem Complexity.
Symbolic and Algebraic Manipulation.
Discrete Mathematics in Computer Science.
Algorithms.
QA76.9.A25
005.82