Correlation analysis in GF(2n)

2Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This chapter is based on Appendix A of the first edition of this book and [52]. In the specification of Rijndael in Chap. 3, we have extensively used operations in a finite field, where the bytes of the state and key represent elements of GF(28).

Cite

CITATION STYLE

APA

Daemen, J., & Rijmen, V. (2020). Correlation analysis in GF(2n). In Information Security and Cryptography (pp. 181–194). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-662-60769-5_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free