Key schedule

Known as: Schedule (disambiguation), Round key, Key scheduling 
In cryptography, the so-called product ciphers are a certain kind of ciphers, where the (de-)ciphering of data is done in "rounds". The general setup… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
  • Chong Hee Kim
  • IEEE Transactions on Information Forensics and…
  • 2012
Differential fault analysis (DFA) finds the key of a block cipher using differential information between correct and faulty… (More)
  • table II
  • figure 1
  • figure 3
  • figure 2
  • figure 5
Is this relevant?
2012
2012
In this paper, we point out a new weakness of the AES key schedule by revisiting an old observation exploited by many known… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2011
2011
We present here the results of a playful research on how to measure the strength of a key schedule algorithm, with applications… (More)
  • table 1
  • table 2
  • table 4
Is this relevant?
2010
2010
PRESENT is a lightweight block cipher designed by A. Bogdanov et al. in 2007 for extremely constrained environments such as RFID… (More)
  • table III
  • table I
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2009
Highly Cited
2009
In this paper we present two related-key attacks on the full AES. For AES-256 we show the first key recovery attack that works… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
This paper describes a DFA attack on the AES key schedule. This fault model assumes that the attacker can induce a single byte… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
In this paper we present several weaknesses in the key scheduling algorithm of RC4, and describe their cryptanalytic signi cance… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
1999
1999
DEAL is a sixor eight-round Luby-Rackoff cipher that uses DES as its round function, with allowed key lengths of 128, 192, and… (More)
Is this relevant?
Highly Cited
1996
Highly Cited
1996
We present new attacks on key schedules of block ciphers These attacks are based on the principles of related key di erential… (More)
Is this relevant?
Highly Cited
1993
Highly Cited
1993
This paper attempts to develop a simple, stronger and safer cryptographic algorithm which would not only be a secure one, but… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 7
Is this relevant?