×
In this paper, we studied equivalent expressions of the generalized AES-like permutation. We found that four rounds of the AES-like permutation can be regarded ...
In this paper, we studied equivalent expressions of the generalized AES-like permutation. We found that four rounds of the AES-like permutation can be regarded ...
It is the best known distinguisher on Grøstl compression function. Our result is a generalized distinguisher on AES-like permutations, also the best ...
In this paper, we studied equivalent expressions of the generalized AES-like permutation. We found that four rounds of the AES-like permutation can be regarded ...
In this paper, we studied equivalent expressions of the generalized AES-like permutation. We found that four rounds of the AES-like permutation can be regarded ...
Apr 25, 2024 · Hyper-Sbox View of AES-like Permutations: A Generalized Distinguisher. Inscrypt 2010: 155-168. [c2]. view. electronic edition via DOI ...
Hyper-Sbox view of AES-like permutations: a generalized distinguisher · Author Picture Shuang Wu. State Key Lab of Information Security, Institute of Software ...
This work considers highly structured truncated differential paths to mount a new rebound attack on Grostl-512, a hash functions based on two AES-like ...
In this paper, we improve the recent rebound and start-from-the-middle attacks on AES-like permutations. Our new cryptanalysis technique uses the fact that one ...
Missing: Hyper- Generalized
New Key-Independent Structural Properties of AES-Like Permutations. IEEE ... Hyper-Sbox View of AES-like Permutations: A Generalized Distinguisher.