Login / Signup

Meet-in-the-middle attacks on AES with value constraints.

Xiaoli DongJun LiuYongzhuang WeiWen GaoJie Chen
Published in: Des. Codes Cryptogr. (2024)
Keyphrases
  • constraint satisfaction
  • neural network
  • constraint programming
  • linear constraints
  • co occurrence
  • constrained optimization
  • global constraints
  • security threats
  • advanced encryption standard