Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,361,824 papers from all fields of science
Search
Sign In
Create Free Account
Advanced Encryption Standard process
Known as:
Aes2
, AES contest
, AES finalist
Expand
The Advanced Encryption Standard (AES), the symmetric block cipher ratified as a standard by National Institute of Standards and Technology of the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Backdoor (computing)
Block cipher
Block size (cryptography)
CAST-256
Expand
Broader (1)
History of cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Fast and Effective Techniques for LWIR Radiative Transfer Modeling: A Dimension Reduction Approach
N. Westing
,
B. Borghetti
,
K. Gross
2019
Corpus ID: 195445980
The increasing spatial and spectral resolution of hyperspectral imagers yields detailed spectroscopy measurements from both space…
Expand
2014
2014
Image Encryption Using Hyper Chaos and Symmetric Cryptography
Mozhgan Mokhtai
,
M. Ashtiyani
,
H. Naraghi
2014
Corpus ID: 212537959
— In recent years, a large amount of work on chaos-based cryptosystems has been published. However, most of them encounter some…
Expand
2013
2013
Common Contaminants of Bacteriology Laboratory : Microbiological Paramores
J. Konar
,
Sanjeev Das
2013
Corpus ID: 32228024
Frequent environmental contaminants within microbiology laboratory create not only diagnostic dilemmas but also poses major risk…
Expand
2008
2008
Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent
B. Collard
,
F. Standaert
,
J. Quisquater
2008
Corpus ID: 18928205
This paper reports on the improved and multiple linear cryptanalysis of reduced round Serpent by mean of a branch-and-bound…
Expand
2005
2005
Characteristics of Key-Dependent S-Boxes: the Case of Twofish
Marco Macchetti
IACR Cryptology ePrint Archive
2005
Corpus ID: 1771577
In this paper we analyze and discuss the cryptographic robustness of key-dependent substitution boxes (KDSBs); these can be found…
Expand
2002
2002
An AES Candidate Algorithm-128 bit Block Encryption Algorithm E2
Deng Yuan-qing
2002
Corpus ID: 63350192
The 128-bit block encryption algorithm E2 is an AES candidate algorithm presented to NIST by Japanese cryptographers M. Kanda etc…
Expand
Highly Cited
2000
Highly Cited
2000
A Performance Comparison of the Five AES Finalists
B. Schneier
,
D. Whiting
AES Candidate Conference
2000
Corpus ID: 37980665
2000
2000
Potential Flaws in the Conjectured Resistance of MARS to Linear Cryptanalysis
M. Robshaw
,
Y. Yin
2000
Corpus ID: 18224655
In this note we consider the conjectured resistance of MARS to linear cryptanalysis and discover that some of the existing…
Expand
1999
1999
Implementation Experience with AES Candidate Algorithms
B. Gladman
1999
Corpus ID: 59720873
The specifications of the 15 AES candidates vary widely in form, with some using a formal mathematical style while others rely on…
Expand
1998
1998
Decorrelated Fast Cipher: an AES Candidate
H. Gilbert
,
M. Girault
,
+5 authors
S. Vaudenay
1998
Corpus ID: 60835053
This report presents a response to the call for candidates issued by the National Institute for Standards and Technologies (the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE