Login / Signup
Meet-in-the-middle attacks on 10-round AES-256.
Rongjia Li
Chenhui Jin
Published in:
Des. Codes Cryptogr. (2016)
Keyphrases
</>
block cipher
s box
advanced encryption standard
cryptographic algorithms
hash functions
lightweight
countermeasures
secret key
database systems
security protocols
malicious attacks
network security
initial conditions
traffic analysis