Chang, Donghoon; Ghosh, Mohona; Sanadhya, Somitra Kumar
(2015-03-23)
In this work, we revisit the security analysis of AES-128 instantiated hash modes. We use
biclique cryptanalysis technique as our basis for the attack. The traditional biclique approach used
for key recovery in AES (and ...