2011
DOI: 10.1007/978-3-642-21512-4_38
|View full text |Cite
|
Sign up to set email alerts
|

One Approach of Using Key-Dependent S-BOXes in AES

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
6
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 1 publication
0
6
0
Order By: Relevance
“… Dynamic S-Box The dynamic S-Box put forward as recommended in the proposition in [24] is characterized as under:…”
Section: A S-box Based Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“… Dynamic S-Box The dynamic S-Box put forward as recommended in the proposition in [24] is characterized as under:…”
Section: A S-box Based Schemesmentioning
confidence: 99%
“…The absolute key size is 64 bits, and every 8 th bit of the key, i.e. 8,16,24,32,40,48,56 and 64 are eliminated from 64 bits with only 56-bit key left. Here, 8 bits are exclusively used for parity checking and hence neglected.…”
Section: Introductionmentioning
confidence: 99%
“…In 2011, Szaban and Seredynski [22] proposed cryptanalysis of a methodology to design dynamic cellular automata (CA)-based S-boxes. Stoianov [21] presented and analyzed an approach to change the S-boxes used in the algorithm AES. In 2013, Peng and Jin [18] proposed a cryptanalysis of a new method to design key-dependent S-boxes by using hyperchaotic Chen system.…”
Section: Introductionmentioning
confidence: 99%
“…Proposal 2: xAES The author in[27] put forward another scheme of key scheduling called xAES. The xAES is indistinguishable from the AES aside from the scheduling of key.…”
mentioning
confidence: 99%