Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,110,149 papers from all fields of science
Search
Sign In
Create Free Account
Advanced Encryption Standard process
Known as:
Aes2
, AES contest
, AES finalist
Expand
The Advanced Encryption Standard (AES), the symmetric block cipher ratified as a standard by National Institute of Standards and Technology of the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Backdoor (computing)
Block cipher
Block size (cryptography)
CAST-256
Expand
Broader (1)
History of cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Fast and Effective Techniques for LWIR Radiative Transfer Modeling: A Dimension Reduction Approach
N. Westing
,
B. Borghetti
,
K. Gross
2019
Corpus ID: 195445980
The increasing spatial and spectral resolution of hyperspectral imagers yields detailed spectroscopy measurements from both space…
Expand
2015
2015
GMU Hardware API for Authenticated Ciphers
Ekawat Homsirikamol
,
William Diehl
,
Ahmed Ferozpuri
,
Farnoud Farahmand
,
Umar Sharif
,
K. Gaj
IACR Cryptology ePrint Archive
2015
Corpus ID: 33530632
In this paper, we propose a universal hardware Application Programming Interface (API) for authenticated ciphers. In particular…
Expand
2013
2013
A Novel Cloud Computing Algorithm of Security and Privacy
Chih-Yung Chen
,
Jih-Fu Tu
2013
Corpus ID: 54642080
The emergence of cloud computing has simplified the flow of large-scale deployment distributed system of software suppliers; when…
Expand
2013
2013
Common Contaminants of Bacteriology Laboratory : Microbiological Paramores
J. Konar
,
Sanjeev Das
2013
Corpus ID: 32228024
Frequent environmental contaminants within microbiology laboratory create not only diagnostic dilemmas but also poses major risk…
Expand
2011
2011
Parallelizing AES on multicores and GPUs
J. Ortega
,
H. Trefftz
,
C. Trefftz
IEEE International Conference on Electro…
2011
Corpus ID: 41779442
The AES block cipher cryptographic algorithm is widely used and it is resource intensive. An existing sequential open source…
Expand
2010
2010
Cryptanalysis of Block Ciphers Using Almost-Impossible Differentials
H. Mala
,
Mohammad Dakhilalian
,
Mohsen Shakiba
IACR Cryptology ePrint Archive
2010
Corpus ID: 13525821
In this paper, inspired from the notion of impossible differentials, we present a model to use differentials that are less…
Expand
2008
2008
Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent
B. Collard
,
François-Xavier Standaert
,
J. Quisquater
2008
Corpus ID: 18928205
This paper reports on the improved and multiple linear cryptanalysis of reduced round Serpent by mean of a branch-and-bound…
Expand
Highly Cited
2000
Highly Cited
2000
A Performance Comparison of the Five AES Finalists
B. Schneier
,
D. Whiting
AES Candidate Conference
2000
Corpus ID: 37980665
2000
2000
Potential Flaws in the Conjectured Resistance of MARS to Linear Cryptanalysis
M. Robshaw
,
Y. Yin
2000
Corpus ID: 18224655
In this note we consider the conjectured resistance of MARS to linear cryptanalysis and discover that some of the existing…
Expand
1999
1999
Implementation Experience with AES Candidate Algorithms
B. Gladman
1999
Corpus ID: 59720873
The specifications of the 15 AES candidates vary widely in form, with some using a formal mathematical style while others rely on…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE