Cryptology ePrint Archive: Report 2011/349

Available versions in chronological order


Efficient Methods for Exploiting Faults Induced at AES Middle Rounds
Chong Hee Kim


[ Cryptology ePrint archive ]