In this paper we present a tweak for the key schedule of AES in a form of a few additional basic operations such as rotations and S-boxes. This leads to a new cipher, which we call xAES, and which is resistant against the latest related-key differential attacks found in AES. xAES has a speed benchmark close to the one of AES even in the applications which use a frequent change of the master key. © 2011 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Nikolić, I. (2011). Tweaking AES. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6544 LNCS, pp. 198–210). https://doi.org/10.1007/978-3-642-19574-7_14
Mendeley helps you to discover research relevant for your work.