AES ConferencePub Date : 2004-05-10DOI: 10.1007/11506447_13
V. Rijmen, E. Oswald
{"title":"Representations and Rijndael Descriptions","authors":"V. Rijmen, E. Oswald","doi":"10.1007/11506447_13","DOIUrl":"https://doi.org/10.1007/11506447_13","url":null,"abstract":"","PeriodicalId":417587,"journal":{"name":"AES Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123966421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AES ConferencePub Date : 2004-05-10DOI: 10.1007/11506447_9
Norbert Pramstaller, S. Mangard, Sandra Dominikus, J. Wolkerstorfer
{"title":"Efficient AES Implementations on ASICs and FPGAs","authors":"Norbert Pramstaller, S. Mangard, Sandra Dominikus, J. Wolkerstorfer","doi":"10.1007/11506447_9","DOIUrl":"https://doi.org/10.1007/11506447_9","url":null,"abstract":"","PeriodicalId":417587,"journal":{"name":"AES Conference","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130057276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AES ConferencePub Date : 2004-05-10DOI: 10.1007/11506447_1
H. Dobbertin, L. Knudsen, M. Robshaw
{"title":"The Cryptanalysis of the AES - A Brief Survey","authors":"H. Dobbertin, L. Knudsen, M. Robshaw","doi":"10.1007/11506447_1","DOIUrl":"https://doi.org/10.1007/11506447_1","url":null,"abstract":"","PeriodicalId":417587,"journal":{"name":"AES Conference","volume":"16 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123450303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AES ConferencePub Date : 2004-05-10DOI: 10.1007/11506447_5
L. Keliher
{"title":"Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES","authors":"L. Keliher","doi":"10.1007/11506447_5","DOIUrl":"https://doi.org/10.1007/11506447_5","url":null,"abstract":"","PeriodicalId":417587,"journal":{"name":"AES Conference","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131990804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AES ConferencePub Date : 2004-05-10DOI: 10.1007/11506447_3
M. Minier
{"title":"A Three Rounds Property of the AES","authors":"M. Minier","doi":"10.1007/11506447_3","DOIUrl":"https://doi.org/10.1007/11506447_3","url":null,"abstract":"","PeriodicalId":417587,"journal":{"name":"AES Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133882428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AES ConferencePub Date : 2004-05-10DOI: 10.1007/11506447_7
N. Courtois
{"title":"General Principles of Algebraic Attacks and New Design Criteria for Cipher Components","authors":"N. Courtois","doi":"10.1007/11506447_7","DOIUrl":"https://doi.org/10.1007/11506447_7","url":null,"abstract":"","PeriodicalId":417587,"journal":{"name":"AES Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124098899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AES ConferencePub Date : 2004-05-10DOI: 10.1007/11506447_14
Frederik Armknecht, S. Lucks
{"title":"Linearity of the AES Key Schedule","authors":"Frederik Armknecht, S. Lucks","doi":"10.1007/11506447_14","DOIUrl":"https://doi.org/10.1007/11506447_14","url":null,"abstract":"","PeriodicalId":417587,"journal":{"name":"AES Conference","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127114848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}