* Finite field arithmetic ((slides(s): 3-4, time: 1:19)
* AES structure ((slides(s): 5, time: 4:17)
- General structure
- Detailed structure
* AES key expansion ((slides(s): 22-23, time: 38:23)
- Key expansion algorithm Rationale ((slides(s): 24, time: 45:31)
* AES transformation functions
- Substitute bytes ((slides(s): 11-15, time: 21:29)
- ShiftRows ((slides(s): 16-17, time: 26:20)
- MixColumns ((slides(s): 18-19, time: 31:39)
- AddRoundKey ((slides(s): 20, time: 34:51)
* Interchanging InvShift Rows and InvSubBytes ((slides(s): 30, time: 58:20)
* Interchanging AddRoundKey and InvMixColumns ((slides(s): 31, time: 59:58)
* AES implementation ((slides(s): 33-34, time: 1:01:27)
- Equivalent inverse cipher
- Implementation aspects
* Summary ((slides(s): 34, time: 1:04:04)
ANNOTATION BY: an SSP CCE 2021 alumnus who prefered to be anonymous!
--Computer and Network Security