Attacking 9 and 10 Rounds of AES-256.
Ewan FleischmannMichael GorskiStefan LucksPublished in: ACISP (2009)
Keyphrases
- cryptographic algorithms
- advanced encryption standard
- secret key
- image processing
- encryption algorithms
- s box
- information security
- data encryption standard
- relational databases
- information technology
- pattern recognition
- management system
- data mining
- block cipher
- fault model
- computational complexity
- multi agent systems
- computer vision