Cited By
View all- Leurent GPernot C(2025)New Representations of the AES Key ScheduleJournal of Cryptology10.1007/s00145-024-09522-538:1Online publication date: 1-Mar-2025
- Yang QSong LZhang NShi DWang LZhao JHu LWeng J(2024)Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key RecoveryJournal of Cryptology10.1007/s00145-024-09499-137:2Online publication date: 10-Apr-2024
- Song LZhang NYang QShi DZhao JHu LWeng J(2022)Optimizing Rectangle Attacks: A Unified and Generic Framework for Key RecoveryAdvances in Cryptology – ASIACRYPT 202210.1007/978-3-031-22963-3_14(410-440)Online publication date: 5-Dec-2022
- Show More Cited By