AES Conference最新文献

筛选
英文 中文
Representations and Rijndael Descriptions
AES Conference Pub Date : 2004-05-10 DOI: 10.1007/11506447_13
V. Rijmen, E. Oswald
{"title":"Representations and Rijndael Descriptions","authors":"V. Rijmen, E. Oswald","doi":"10.1007/11506447_13","DOIUrl":"https://doi.org/10.1007/11506447_13","url":null,"abstract":"","PeriodicalId":417587,"journal":{"name":"AES Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123966421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Efficient AES Implementations on ASICs and FPGAs AES在asic和fpga上的高效实现
AES Conference Pub Date : 2004-05-10 DOI: 10.1007/11506447_9
Norbert Pramstaller, S. Mangard, Sandra Dominikus, J. Wolkerstorfer
{"title":"Efficient AES Implementations on ASICs and FPGAs","authors":"Norbert Pramstaller, S. Mangard, Sandra Dominikus, J. Wolkerstorfer","doi":"10.1007/11506447_9","DOIUrl":"https://doi.org/10.1007/11506447_9","url":null,"abstract":"","PeriodicalId":417587,"journal":{"name":"AES Conference","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130057276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers 逆s盒、非线性多项式关系与分组密码的密码分析
AES Conference Pub Date : 2004-05-10 DOI: 10.1007/11506447_15
N. Courtois
{"title":"The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers","authors":"N. Courtois","doi":"10.1007/11506447_15","DOIUrl":"https://doi.org/10.1007/11506447_15","url":null,"abstract":"","PeriodicalId":417587,"journal":{"name":"AES Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127773041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
The Boomerang Attack on 5 and 6-Round Reduced AES 5和6回合减少AES的回旋镖攻击
AES Conference Pub Date : 2004-05-10 DOI: 10.1007/11506447_2
A. Biryukov
{"title":"The Boomerang Attack on 5 and 6-Round Reduced AES","authors":"A. Biryukov","doi":"10.1007/11506447_2","DOIUrl":"https://doi.org/10.1007/11506447_2","url":null,"abstract":"","PeriodicalId":417587,"journal":{"name":"AES Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121109998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 100
The Cryptanalysis of the AES - A Brief Survey AES的密码分析——综述
AES Conference Pub Date : 2004-05-10 DOI: 10.1007/11506447_1
H. Dobbertin, L. Knudsen, M. Robshaw
{"title":"The Cryptanalysis of the AES - A Brief Survey","authors":"H. Dobbertin, L. Knudsen, M. Robshaw","doi":"10.1007/11506447_1","DOIUrl":"https://doi.org/10.1007/11506447_1","url":null,"abstract":"","PeriodicalId":417587,"journal":{"name":"AES Conference","volume":"16 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123450303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
An Algebraic Interpretation of AES-128 AES-128的代数解释
AES Conference Pub Date : 2004-05-10 DOI: 10.1007/11506447_8
Ilia Toli, A. Zanoni
{"title":"An Algebraic Interpretation of AES-128","authors":"Ilia Toli, A. Zanoni","doi":"10.1007/11506447_8","DOIUrl":"https://doi.org/10.1007/11506447_8","url":null,"abstract":"","PeriodicalId":417587,"journal":{"name":"AES Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129416519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES AES线性和差分密码分析界的精细分析
AES Conference Pub Date : 2004-05-10 DOI: 10.1007/11506447_5
L. Keliher
{"title":"Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES","authors":"L. Keliher","doi":"10.1007/11506447_5","DOIUrl":"https://doi.org/10.1007/11506447_5","url":null,"abstract":"","PeriodicalId":417587,"journal":{"name":"AES Conference","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131990804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
A Three Rounds Property of the AES A AES的三轮性质
AES Conference Pub Date : 2004-05-10 DOI: 10.1007/11506447_3
M. Minier
{"title":"A Three Rounds Property of the AES","authors":"M. Minier","doi":"10.1007/11506447_3","DOIUrl":"https://doi.org/10.1007/11506447_3","url":null,"abstract":"","PeriodicalId":417587,"journal":{"name":"AES Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133882428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components 代数攻击的一般原理和密码组件的新设计准则
AES Conference Pub Date : 2004-05-10 DOI: 10.1007/11506447_7
N. Courtois
{"title":"General Principles of Algebraic Attacks and New Design Criteria for Cipher Components","authors":"N. Courtois","doi":"10.1007/11506447_7","DOIUrl":"https://doi.org/10.1007/11506447_7","url":null,"abstract":"","PeriodicalId":417587,"journal":{"name":"AES Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124098899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Linearity of the AES Key Schedule AES密钥调度的线性
AES Conference Pub Date : 2004-05-10 DOI: 10.1007/11506447_14
Frederik Armknecht, S. Lucks
{"title":"Linearity of the AES Key Schedule","authors":"Frederik Armknecht, S. Lucks","doi":"10.1007/11506447_14","DOIUrl":"https://doi.org/10.1007/11506447_14","url":null,"abstract":"","PeriodicalId":417587,"journal":{"name":"AES Conference","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127114848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信