We discuss different descriptions of Rijndael and its components and how to find them. The fact that it is easy to find equivalent descriptions for the Rijndael transformations, has been used for two different goals. Firstly, to design implementations on a variety of platforms, both efficient and resistant against side channel analysis. Secondly, to analyze the security of the cipher We discuss these aspects, give examples, and present our views. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Rijmen, V., & Oswald, E. (2005). Representations and Rijndael descriptions. In Lecture Notes in Computer Science (Vol. 3373, pp. 148–158). Springer Verlag. https://doi.org/10.1007/11506447_13
Mendeley helps you to discover research relevant for your work.