Login / Signup
The Exchange Attack: How to Distinguish Six Rounds of AES with 2^88.2 Chosen Plaintexts.
Navid Ghaedi Bardeh
Sondre Rønjom
Published in:
ASIACRYPT (3) (2019)
Keyphrases
</>
secret key
block cipher
encryption algorithm
fault model
encryption algorithms
information exchange
countermeasures
smart card
encryption scheme
ddos attacks
data sets
authentication scheme
pseudorandom
encryption decryption
power analysis
knowledge exchange
key distribution
authentication protocol
case study
website