共 50 条
- [1] Switching between the AES-128 and AES-256 Using Ks * & Two Keys INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (08): : 136 - 140
- [2] Repeated Differential Properties of the AES-128 and AES-256 Key Schedules TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 525 - 532
- [6] The research of DPA attacks against AES implementations J. China Univ. Post Telecom., 2008, 4 (101-106):
- [8] FPGA implementation of Combined AES-128 2017 8TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2017,
- [9] AES-128 implementation on a Virtex-4 FPGA 2007 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY, VOLS 1-3, 2007, : 271 - 276
- [10] Related-key rectangle attacks on reduced AES-192 and AES-256 FAST SOFTWARE ENCRYPTION, 2007, 4593 : 225 - +