Meet-in-the-middle Attacks on AES with Value Constraints
Designs, Codes and Cryptography(2024)
Key words
Cryptanalysis,Block cipher,AES,Meet-in-the-middle,94A60
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined