I)ruid wrote:
> Paper and details are not yet public, but Schneier provides a summary:
> http://www.schneier.com/blog/archives/2009/07/another_new_aes.html
> Basically, if AES-256 is implemented with fewer rounds than the standard
> specifies (essentially the number of rounds recommended for AES-128), it
> is susceptible to a number of related-key attacks.
Paper and details are now public --- http://eprint.iacr.org/2009/374

The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com

Reply via email to