Improved single-key attacks on 9-round AES-192/256

L Li, K Jia, X Wang - International Workshop on Fast Software Encryption, 2014 - Springer
This paper focuses on key-recovery attacks on 9-round AES-192 and AES-256 under single-
key model with the framework of the meet-in-the-middle attack. A new technique named key …

Improved Single-Key Attacks on 9-Round AES-192/256

L Li, K Jia, X Wang - … Workshop, FSE 2014, London, UK, March 3 …, 2015 - books.google.com
This paper focuses on key-recovery attacks on 9-round AES-192 and AES-256 under single-
key model with the framework of the meet-in-the-middle attack. A new technique named key …

[PDF][PDF] Improved Single-Key Attacks on 9-Round AES-192/256

L Li, K Jia, X Wang - fse2014.isg.rhul.ac.uk
2.2 Obtain the corresponding plaintext-ciphertext pairs from the collection data. Then guess
the related subkeys in E2, and partially decrypt the ciphertexts to get the corresponding 256 …

[引用][C] Improved Single-Key Attacks on 9-Round AES-192/256

L Li, K Jia, X Wang - FSE 2014 (21st International Workshop on Fast …, 2014 - hal.science
Improved Single-Key Attacks on 9-Round AES-192/256 - Archive ouverte HAL Accéder
directement au contenu Documentation FR Français (FR) Anglais (EN) Se connecter HAL …

[PDF][PDF] Improved Single-Key Attacks on 9-Round AES-192/256

L Li, K Jia, X Wang - pdfs.semanticscholar.org
2.2 Obtain the corresponding plaintext-ciphertext pairs from the collection data. Then guess
the related subkeys in E2, and partially decrypt the ciphertexts to get the corresponding 256 …

[PDF][PDF] Improved Single-Key Attacks on 9-Round AES-192/256

L Li, K Jia, X Wang - iacr.org
This paper focuses on key-recovery attacks on 9-round AES-192 and AES-256 under single-
key model with the framework of the meet-in-the-middle attack. A new technique named key …

Improved Single-Key Attacks on 9-Round AES-192/256

L Li, K Jia, X Wang - Fast Software Encryption - Springer
This paper focuses on key-recovery attacks on 9-round AES-192 and AES-256 under single-
key model with the framework of the meet-in-the-middle attack. A new technique named key …

[引用][C] Improved Single-Key Attacks on 9-Round AES-192/256

L Li, K Jia, X Wang - FSE 2014 (21st International Workshop on …, 2014 - inria.hal.science
Improved Single-Key Attacks on 9-Round AES-192/256 - Inria - Institut national de recherche
en sciences et technologies du numérique Accéder directement au contenu Documentation FR …

[引用][C] Improved Single-Key Attacks on 9-Round AES-192/256

L Li, K Jia, X Wang - FSE 2014 (21st International Workshop on Fast …, 2014 - hal.univ-smb.fr
Improved Single-Key Attacks on 9-Round AES-192/256 - Laboratoire Franco-Chinois d'Informatique,
d'Automatique et de Mathématiques Appliquées Accéder directement au contenu …

[PDF][PDF] Improved Single-Key Attacks on 9-Round AES-192/256

L Li, K Jia, X Wang - iacr.org
2.2 Obtain the corresponding plaintext-ciphertext pairs from the collection data. Then guess
the related subkeys in E2, and partially decrypt the ciphertexts to get the corresponding 256 …