{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:02Z","timestamp":1750307582377,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T00:00:00Z","timestamp":1259020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,24]]},"DOI":"10.1145\/1655925.1656164","type":"proceedings-article","created":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T15:21:10Z","timestamp":1259076070000},"page":"1302-1305","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A taxonomy of security attacks on the advanced encryption standard"],"prefix":"10.1145","author":[{"given":"Vivaksha J.","family":"Jariwala","sequence":"first","affiliation":[{"name":"C. K. Pithawalla College of Engg. &amp; Tech., Surat, India"}]},{"given":"Devesh C.","family":"Jinwala","sequence":"additional","affiliation":[{"name":"Sardar Vallabhbhai National Institute of Technolgy, Ichchanath, Surat, India"}]}],"member":"320","published-online":{"date-parts":[[2009,11,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11506447_1"},{"key":"e_1_3_2_1_2_1","volume-title":"Cryptologia","author":"Chung-Wei Phan Raphael","year":"2002","unstructured":"Raphael Chung-Wei Phan , \" Mini Advanced Encryption Standard (Mini-AES) : A Testbed for Cryptanalysis Students \", Cryptologia , vol. XXVI (4), 2002 . Raphael Chung-Wei Phan, \"Mini Advanced Encryption Standard (Mini-AES): A Testbed for Cryptanalysis Students\", Cryptologia, vol. XXVI (4), 2002."},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. Third Advanced Encryption Standard Conference, NIST","author":"Biham Eli","year":"2000","unstructured":"Eli Biham and Nathan Keller , \"Cryptanalysis of reduced variants of RIJNDAEL \", in Proc. Third Advanced Encryption Standard Conference, NIST , April 2000 . Eli Biham and Nathan Keller, \"Cryptanalysis of reduced variants of RIJNDAEL\", in Proc. Third Advanced Encryption Standard Conference, NIST, April 2000."},{"key":"e_1_3_2_1_4_1","first-page":"39","volume-title":"3rd International Conference on Information Security and Cryptology (ICISC 2001","volume":"2288","author":"Cheon J. H.","year":"2001","unstructured":"J. H. Cheon , M. Kim , K. Kim , J.-Y. Lee , and S. Kang , \" Improved impossible differential cryptanalysis of Rijndael and Crypton \", In 3rd International Conference on Information Security and Cryptology (ICISC 2001 ), volume 2288 of Lecture Notes in Computer Science 2288, Springer-Verlag, Berlin--New York , 2001 , pp. 39 -- 19 . J. H. Cheon, M. Kim, K. Kim, J.-Y. Lee, and S. Kang, \"Improved impossible differential cryptanalysis of Rijndael and Crypton\", In 3rd International Conference on Information Security and Cryptology (ICISC 2001), volume 2288 of Lecture Notes in Computer Science 2288, Springer-Verlag, Berlin--New York, 2001, pp. 39--19."},{"key":"e_1_3_2_1_5_1","volume-title":"4th International Workshop, FSE'97","author":"Daemen J.","year":"1997","unstructured":"J. Daemen , L. Knudsen , and V. Rijmen , \" The block cipher Square\", In Fast Software Encryption , 4th International Workshop, FSE'97 , Haifa, Israel , January 1997 , E. Biham (ed.), Lecture Notes in Computer Science, vol. 1267, Springer-Verlag, Berlin -- New York, pp. 149--165, 1997. J. Daemen, L. Knudsen, and V. Rijmen, \"The block cipher Square\", In Fast Software Encryption, 4th International Workshop, FSE'97, Haifa, Israel, January 1997, E. Biham (ed.), Lecture Notes in Computer Science, vol. 1267, Springer-Verlag, Berlin -- New York, pp. 149--165, 1997."},{"key":"e_1_3_2_1_6_1","unstructured":"J. Daemen and V. Rijmen \"AES Proposal: Rijndael\" Version 2.0 available via http:\/\/www.crsc.nist.gov.  J. Daemen and V. Rijmen \"AES Proposal: Rijndael\" Version 2.0 available via http:\/\/www.crsc.nist.gov."},{"key":"e_1_3_2_1_7_1","first-page":"230","volume-title":"Proc of the Third Advanced Encryption Standard Conference","author":"Gilbert Henri","year":"2000","unstructured":"Henri Gilbert and Marine Minier , \"Acollision attack on seven rounds of Rijndael \", in Proc of the Third Advanced Encryption Standard Conference , pages 230 -- 241 . NIST, April 2000 . Henri Gilbert and Marine Minier, \"Acollision attack on seven rounds of Rijndael\", in Proc of the Third Advanced Encryption Standard Conference, pages 230--241. NIST, April 2000."},{"key":"e_1_3_2_1_8_1","first-page":"41","volume-title":"Proc. Cryptography, Mini symposium","author":"Leonard","year":"2004","unstructured":"Leonard tersteeg, \"Best Known attacks on AES \", in Proc. Cryptography, Mini symposium , 2004 , pp. 41 -- 48 . Leonard tersteeg, \"Best Known attacks on AES\", in Proc. Cryptography, Mini symposium, 2004, pp. 41--48."},{"key":"e_1_3_2_1_9_1","first-page":"162","volume-title":"Wright {Wri03}","author":"Seifert J.","unstructured":"Bloomer, J. and Seifert , J . Fault based cryptanalysis of the advanced encryption standard (AES) . In Wright {Wri03} , pp. 162 -- 181 . Bloomer, J. and Seifert, J. Fault based cryptanalysis of the advanced encryption standard (AES). In Wright {Wri03}, pp. 162--181."},{"key":"e_1_3_2_1_10_1","first-page":"215","volume-title":"Proc. 3rd Advanced Encryption Standard Candidate Conference, National Institute of Standards and Technology","author":"Lucks S.","year":"2000","unstructured":"S. Lucks , \"Attacking seven rounds of Rijndael under 192-bit keys and 256-bit keys \", in Proc. 3rd Advanced Encryption Standard Candidate Conference, National Institute of Standards and Technology , April 2000 , pp. 215 -- 229 . S. Lucks, \"Attacking seven rounds of Rijndael under 192-bit keys and 256-bit keys\", in Proc. 3rd Advanced Encryption Standard Candidate Conference, National Institute of Standards and Technology, April 2000, pp. 215--229."},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. Fast Software Encryption","author":"Improved Cryptanalysis","year":"2000","unstructured":"Ferguson, Niels, and Kelsey, John, and Lucks, Stefan, and Schneier, Bruce, and Stay, Mike, and Wagner, David, and Whiting, Doug, \" Improved Cryptanalysis of Rijndael\" , in Proc. Fast Software Encryption , 2000 . Ferguson, Niels, and Kelsey, John, and Lucks, Stefan, and Schneier, Bruce, and Stay, Mike, and Wagner, David, and Whiting, Doug, \"Improved Cryptanalysis of Rijndael\", in Proc. Fast Software Encryption, 2000."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.169"}],"event":{"name":"ICIS '09: The 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","sponsor":["AICIT","ETRI","KISTI"],"location":"Seoul Korea","acronym":"ICIS '09"},"container-title":["Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656164","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1655925.1656164","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:17Z","timestamp":1750250477000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656164"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,24]]},"references-count":12,"alternative-id":["10.1145\/1655925.1656164","10.1145\/1655925"],"URL":"https:\/\/doi.org\/10.1145\/1655925.1656164","relation":{},"subject":[],"published":{"date-parts":[[2009,11,24]]},"assertion":[{"value":"2009-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}