Cryptology ePrint Archive: Report 2011/349
Available versions in chronological order
20110701:062431 (posted 01-Jul-2011 06:24:31 UTC)
Efficient Methods for Exploiting Faults Induced at AES Middle Rounds
Chong Hee Kim
[
Cryptology ePrint archive
]