共 50 条
- [21] Meet-in-the-middle attacks on 10-round AES-256 Designs, Codes and Cryptography, 2016, 80 : 459 - 471
- [23] Improved Single-Key Attacks on 8-Round AES-192 and AES-256 Journal of Cryptology, 2015, 28 : 397 - 422
- [25] Enhancement of Security Mechanism for Confidential Data using AES-128, 192 and 256bit Encryption in Cloud 2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 374 - 378
- [26] Improved preimage attacks on hash modes of 8-round AES-256 Multimedia Tools and Applications, 2016, 75 : 14525 - 14539
- [27] Key Advantage Template Attack Against AES-128 Algorithm Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2020, 48 (10): : 2003 - 2008
- [30] A high-throughput area efficient FPGA implementation of AES-128 encryption 2005 IEEE WORKSHOP ON SIGNAL PROCESSING SYSTEMS - DESIGN AND IMPLEMENTATION (SIPS), 2005, : 116 - 121