최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기IEICE transactions on fundamentals of electronics, communications and computer sciences, v.E94A no.1, 2011년, pp.3 - 9
KOO, Bonwook (ETRI) , YEOM, Yongjin (ETRI) , SONG, Junghwan (Hanyang University)
Square is an 8-round SPN structure block cipher and its round function and key schedule have been slightly modified to design building blocks of Rijndael. Key schedule of Square is simple and efficient but fully affine, so we apply a related-key attack on it. We find a 3-round related-key differenti...
10.1007/BF00203965 [1] E. Biham, “New types of cryptanalytic attacks using related keys,” J. Cryptol., vol.7, no.4, pp.229-246, 1994.
0302-9743 BIHAM ELI 3494 507 2005 10.1007/11426639_30
[3] E. Biham, O. Dunkelman, and N. Keller, A Related Key Rectangle Attack on Full KASUMI, ed. B.K. Roy, ASIACRYPT 2005, LNCS, vol.3788, pp.443-461, Springer, Heidelberg, 2005.
10.1007/978-3-642-13190-5_15 [4] A. Biryukov, O. Dunkelman, N. Keller, D. Khovratovich, and A. Shamir, “Key recovery attacks of practical complexity on AES variants with up to 10 rounds,” Cryptology ePrint Archive, Report 2009/374.
Bellare, M., Kohno, T.. A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications. Lecture notes in computer science, vol.2656, 491-506.
0302-9743 BIRYUKOV ALEX 5912 1 2009 10.1007/978-3-642-10366-7_1
10.1007/978-3-642-03356-8_14 [7] A. Biryukov, D. Khovratovich, and I. Nikolic, “Distinguisher and related-key attack on the full AES-256,” ed. S. Halevi, CRYPTO 2009, LNCS, vol.5766, pp.231-249, Springer, Heidelberg, 2009.
Chabaud, F., Joux, A.. Differential Collisions in SHA-0. Lecture notes in computer science, vol.1462, 56-71.
Daemen, J., Knudsen, L., Rijmen, V.. The Block Cipher Square. Lecture notes in computer science, vol.1267, 149-165.
[10] J. Daemen and V. Rijmen, AES Proposal: Rijndael, AES Algorithm Submission, Sept. 3, 1999, available from the US National Institute of Standards and Technology (NIST) AES web site at http://csrc.nist.gov/encryption/aes/
10.1007/3-540-44706-7_15 [11] N. Ferguson, J. Kelsey, S. Lucks, B. Schneier, M. Stay, D. Wagner, D. Whiting, “Improved cryptanalysis of rijndael,” eds. G. Goos, J. Hartmanis, J. Leeuwen, FSE 2000, LNCS, vol.1978, pp.136-141, Springer, Heidelberg, 2001.
0302-9743 GORSKI MICHAEL 5365 266 2008 10.1007/978-3-540-89754-5_21
[13] H. Gilbert and M. Minier, “A collision attack on 7 rounds of Rijndael,” The third Advanced Encryption Standard Candidate Conference, pp.230-241, NIST, 2000.
0302-9743 JAULMES E 2365 237 2002 10.1007/3-540-45661-9_19
0302-9743 KELSEY J 1978 75 2001 10.1007/3-540-44706-7_6
0302-9743 LUCKS S 3017 359 2004 10.1007/978-3-540-25937-4_23
[17] M. Liskov, R. Rivest, and D. Wagner, Tweakable block ciphers, ed. M. Yung, CRYPTO 2002, LNCS, vol.2422, pp.31-46, Springer, Heidelberg, 2002.
[18] U.S. National Institute of Standards and Technology, “Advanced encryption standard (AES),” FIPS PUB 197, Nov. 26, 2001, available at http://csrc.nist.gov/encryption/aes
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
저자가 공개 리포지터리에 출판본, post-print, 또는 pre-print를 셀프 아카이빙 하여 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.