Nikolić, Ivica (2009). "Distinguisher and Related-Key Attack on the Full AES-256". Advances in Cryptology - CRYPTO 2009. Lecture Notes in Computer Science. Vol. 5677. Springer Berlin / Heidelberg. pp. 231–249. doi:10.1007/978-3-642-03356-8_14. ISBN978-3-642-03355-1.
Bogdanov, Andrey; Khovratovich, Dmitry; Rechberger, Christian (2011). "Biclique Cryptanalysis of the Full AES". In Lee, Dong Hoon; Wang, Xiaoyun (eds.). Advances in Cryptology – ASIACRYPT 2011. Lecture Notes in Computer Science. Vol. 7073. pp. 344–371. doi:10.1007/978-3-642-25385-0_19. ISBN978-3-642-25385-0.
Tao, Biaoshuai; Wu, Hongjun (2015). "Improving the Biclique Cryptanalysis of AES". In Foo, Ernest; Stebila, Douglas (eds.). Information Security and Privacy. Lecture Notes in Computer Science. Vol. 9144. pp. 39–56. doi:10.1007/978-3-319-19962-7_3. ISBN978-3-319-19962-7.
Ashokkumar, C.; Giri, Ravi Prakash; Menezes, Bernard (12 May 2016). Highly Efficient Algorithms for AES Key Retrieval in Cache Access Attacks. 2016 IEEE European Symposium on Security and Privacy (EuroS&P). Saarbruecken, Germany. pp. 261–275. doi:10.1109/EuroSP.2016.29.
The AES Known Answer Test (KAT) Vectors are available in Zip format within the NIST site hereArchived 2009-10-23 at the Wayback Machine
Daemen, Joan; Rijmen, Vincent (March 9, 2003). "AES Proposal: Rijndael"(PDF). National Institute of Standards and Technology. p. 1. Archived(PDF) from the original on 5 March 2013. Retrieved 21 February 2013.
"Announcing the ADVANCED ENCRYPTION STANDARD (AES)"(PDF). Federal Information Processing Standards Publication 197. United States National Institute of Standards and Technology (NIST). November 26, 2001. Archived(PDF) from the original on August 23, 2024. Retrieved August 26, 2024.
"Sean Murphy". University of London. Archived from the original on 2009-01-31. Retrieved 2008-11-02.
schneier.com
Bruce Schneier (2009-07-30). "Another New AES Attack". Schneier on Security, A blog covering security and security technology. Archived from the original on 2009-10-05. Retrieved 2010-03-11.
Bruce Schneier (17 May 2005). "AES Timing Attack". Archived from the original on 12 February 2007. Retrieved 2007-03-17.
Schneier, Bruce; Kelsey, John; Whiting, Doug; Wagner, David; Hall, Chris; Ferguson, Niels (1999-02-01). "Performance Comparisons of the AES submissions"(PDF). Archived(PDF) from the original on 2011-06-22. Retrieved 2010-12-28.
Bruce Schneier (2009-07-30). "Another New AES Attack". Schneier on Security, A blog covering security and security technology. Archived from the original on 2009-10-05. Retrieved 2010-03-11.
Daemen, Joan; Rijmen, Vincent (March 9, 2003). "AES Proposal: Rijndael"(PDF). National Institute of Standards and Technology. p. 1. Archived(PDF) from the original on 5 March 2013. Retrieved 21 February 2013.
"Announcing the ADVANCED ENCRYPTION STANDARD (AES)"(PDF). Federal Information Processing Standards Publication 197. United States National Institute of Standards and Technology (NIST). November 26, 2001. Archived(PDF) from the original on August 23, 2024. Retrieved August 26, 2024.
Schneier, Bruce; Kelsey, John; Whiting, Doug; Wagner, David; Hall, Chris; Ferguson, Niels (1999-02-01). "Performance Comparisons of the AES submissions"(PDF). Archived(PDF) from the original on 2011-06-22. Retrieved 2010-12-28.