{"guid":"import-8e99ee5524fb2d218b","title":"AES Attacks","subtitle":null,"slug":"19C3-413-aes-attacks","link":"http://www.ccc.de/congress/2002/fahrplan/event/413.en.html","description":"Gross war seit Oktober 2000 die Freude, endlich über ein standardisiertes und sichereres Verschlüsselungsverfahren zu verfügen. Der neue Chipher Rijndael ist schnell und elegant - vielleicht etwas zu schnell und sehr wahrscheinlich viel zu elegant. Neue Angriffsmethoden lassen jedenfalls, obgleich noch entfernt von einer praktischen Durchführbarkeit, bei vielen Kryptographen recht ungute Gefühle entstehen. \n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":504,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-01-17T08:00:05.889+01:00","length":2850,"duration":2850,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-413-aes-attacks.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-413-aes-attacks_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-8e99ee5524fb2d218b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-8e99ee5524fb2d218b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-413-aes-attacks","url":"https://api.media.ccc.de/public/events/import-8e99ee5524fb2d218b","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":4},{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":4},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":9},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":7},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":6},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":9},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":15},{"event_id":713,"event_guid":"import-815c7442f3da8d756e","weight":4},{"event_id":715,"event_guid":"import-2f01514bbfe5970182","weight":9},{"event_id":717,"event_guid":"import-ea2c94e6b14d7bed0e","weight":4},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":6},{"event_id":725,"event_guid":"import-e6b3200a23ed44995e","weight":8},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":6},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":7},{"event_id":761,"event_guid":"import-9407d03f44908c0cf5","weight":4},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":15},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":5},{"event_id":3631,"event_guid":"c5d3d09f-f024-45e3-8ed3-07d44d327e0e","weight":6}],"recordings":[{"size":null,"length":2850,"mime_type":"audio/mpeg","language":"eng","filename":"19C3-413-aes-attacks.mp3","state":"downloaded","folder":"lectures","high_quality":true,"width":null,"height":null,"updated_at":"2014-06-29T00:22:29.065+02:00","recording_url":"https://cdn.media.ccc.de/congress/2002/lectures/19C3-413-aes-attacks.mp3","url":"https://api.media.ccc.de/public/recordings/3923","event_url":"https://api.media.ccc.de/public/events/import-8e99ee5524fb2d218b","conference_url":"https://api.media.ccc.de/public/conferences/19c3"},{"size":null,"length":2852,"mime_type":"video/mp4","language":"eng","filename":"19C3-413-aes-attacks.mp4","state":"downloaded","folder":"mp4","high_quality":true,"width":320,"height":240,"updated_at":"2016-01-27T11:03:10.318+01:00","recording_url":"https://cdn.media.ccc.de/congress/2002/mp4/19C3-413-aes-attacks.mp4","url":"https://api.media.ccc.de/public/recordings/3871","event_url":"https://api.media.ccc.de/public/events/import-8e99ee5524fb2d218b","conference_url":"https://api.media.ccc.de/public/conferences/19c3"}]}