The Design of Rijndael: AES - The Advanced Encryption Standard
Citations
666 citations
Cites background from "The Design of Rijndael: AES - The A..."
...The high-level operation of AES is shown in Listing 1 (based on Daemen and Rijmen’s report [3])....
[...]
624 citations
Cites background from "The Design of Rijndael: AES - The A..."
...The reader with a more investigative appetite is referred to [87]....
[...]
587 citations
Cites background from "The Design of Rijndael: AES - The A..."
...Assume that a user is known to have encrypted 128-bit plaintexts ‘7’ and ‘8’ under a secret 128-bit AES key k, producing a 256-bit ciphertext c = (AESk(7), AESk(8)) visible to the attacker....
[...]
...Presumably this root is k: unless AES is deeply flawed, there will be at most a few pairs of distinct 128-bit keys x, k with collisions (AE Sx(7), AESx(8)) = (AESk(7), AESk(8)), and the user will not have selected one of those keys by chance....
[...]
549 citations
Cites background from "The Design of Rijndael: AES - The A..."
...The most appropriate solution will likely involve the use of hardware cryptographic coprocessors....
[...]
547 citations
Cites methods from "The Design of Rijndael: AES - The A..."
...Several encryption methods have been proposed to address security issues in communication [136], [137]....
[...]
References
65,425 citations
13,597 citations
10,083 citations
8,777 citations
6,757 citations