Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1, pp.70-89 ,
DOI : 10.1007/978-3-642-03356-8_5
A Novel Impossible Differential Cryptanalysis of AES, In: WEWoRc, 2007. ,
Cryptanalysis of Reduced Variants of Rijndael, 2000. ,
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds, pp.299-319 ,
DOI : 10.1007/978-3-642-13190-5_15
Related-Key Cryptanalysis of the Full AES-192 and AES-256, Lecture Notes in Computer Science, vol.5912, pp.1-18, 2009. ,
DOI : 10.1007/978-3-642-10366-7_1
Distinguisher and Related-Key Attack on the Full AES-256, pp.231-249 ,
DOI : 10.1007/978-3-642-03356-8_14
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.3114
Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others, pp.322-344 ,
DOI : 10.1007/978-3-642-13190-5_17
Biclique Cryptanalysis of the Full AES, Lecture Notes in Computer Science, vol.7073, pp.344-371, 2011. ,
DOI : 10.1007/978-3-642-25385-0_19
Automatic Search of Attacks on Round-Reduced AES and Applications, Lecture Notes in Computer Science, vol.6841, pp.169-187, 2011. ,
DOI : 10.1007/978-3-642-22792-9_10
URL : https://hal.archives-ouvertes.fr/hal-01110414
The block cipher Square, Lecture Notes in Computer Science, vol.1267, pp.149-165, 1997. ,
DOI : 10.1007/BFb0052343
A Meet-in-the-Middle Attack on 8-Round AES, Lecture Notes in Computer Science, vol.5086, pp.116-126, 2008. ,
DOI : 10.1007/978-3-540-71039-4_7
Improved Meet-in-the-Middle Attacks on AES, Lecture Notes in Computer Science, vol.5922, pp.144-156, 2009. ,
DOI : 10.1007/978-3-642-10628-6_10
Faster Chosen-Key Distinguishers on Reduced-Round AES, Lecture Notes in Computer Science, vol.7668, pp.225-243, 2012. ,
DOI : 10.1007/978-3-642-34931-7_14
URL : https://hal.archives-ouvertes.fr/hal-01094335
Improved Single-Key Attacks on 8-Round AES-192 and AES-256, Lecture Notes in Computer Science, vol.6477, pp.158-176, 2010. ,
DOI : 10.1007/978-3-642-17373-8_10
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.295.9494
Improved Cryptanalysis of Rijndael, Lecture Notes in Computer Science, pp.213-230, 1978. ,
DOI : 10.1007/3-540-44706-7_15
Advances in Cryptology -EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera Proceedings, 2010. ,
DOI : 10.1007/978-3-642-13190-5
A Collision Attack on 7 Rounds of Rijndael, AES Candidate Conference, pp.230-241, 2000. ,
Advances in Cryptology -Crypto, 29th Annual International Cryptology Conference Proceedings, 2009. ,
New Impossible Differential Attacks on AES, Lecture Notes in Computer Science, vol.91, issue.1, pp.279-293, 2008. ,
DOI : 10.1007/978-3-540-74462-7_2
Improved Impossible Differential Cryptanalysis of 7-Round AES-128, Lecture Notes in Computer Science, vol.6498, pp.282-291, 2010. ,
DOI : 10.1007/978-3-642-17401-8_20
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Gr??stl, Lecture Notes in Computer Science, vol.5665, pp.260-276, 2009. ,
DOI : 10.1007/978-3-642-03317-9_16
Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits, Lecture Notes in Computer Science, vol.6672, pp.222-232, 2011. ,
DOI : 10.1007/978-3-642-21031-0_17