Login / Signup
Feasible Attack on the 13-round AES-256.
Alex Biryukov
Dmitry Khovratovich
Published in:
IACR Cryptol. ePrint Arch. (2010)
Keyphrases
</>
block cipher
secret key
s box
hash functions
lightweight
encryption algorithm
power analysis
fault model
feasible solution
information retrieval
countermeasures
public key
cryptographic algorithms
encryption decryption