Login / Signup
Meet-in-the-middle attacks on AES with value constraints.
Xiaoli Dong
Jun Liu
Yongzhuang Wei
Wen Gao
Jie Chen
Published in:
Des. Codes Cryptogr. (2024)
Keyphrases
</>
constraint satisfaction
neural network
constraint programming
linear constraints
co occurrence
constrained optimization
global constraints
security threats
advanced encryption standard