I)ruid wrote: > Paper and details are not yet public, but Schneier provides a summary: > > http://www.schneier.com/blog/archives/2009/07/another_new_aes.html > > Basically, if AES-256 is implemented with fewer rounds than the standard > specifies (essentially the number of rounds recommended for AES-128), it > is susceptible to a number of related-key attacks. > > Paper and details are now public --- http://eprint.iacr.org/2009/374
--------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com