This chapter is based on Appendix A of the first edition of this book and [52]. In the specification of Rijndael in Chap. 3, we have extensively used operations in a finite field, where the bytes of the state and key represent elements of GF(28).
CITATION STYLE
Daemen, J., & Rijmen, V. (2020). Correlation analysis in GF(2n). In Information Security and Cryptography (pp. 181–194). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-662-60769-5_12
Mendeley helps you to discover research relevant for your work.