Fast Software Encryption - 2014

Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES

Get your print report emailed

Enter your email and we can send you a printable report on this item. ( View sample )

Print report emailed

We'll send you a print report shortly at Unknown

Receive our monthly book update for this book

We will send you an email each month containing links to all the book updates you subscribe to. This will keep informed of all the activity around your favourite books.


You will now receive reports at unknown email address

Share this page with others

You can share this item across the most popular social networks.

Click on the button below to purchase Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES

When you click on the button above, you will be redirected to where you can finish shopping.

Fast Software Encryption

Crossref Citations Summary

No online mentions found

Mendeley readership by country

This chapter has 18 Mendeley readers. Click here to see more details on the Mendeley website.

Country %
Unknown 18 100%

Mendeley readership by discipline

Discipline %
Computer Science 14 78%
Mathematics 2 11%
Engineering 2 11%

Mendeley readership by professional status

Professional status %
Student > Ph. D. Student 7 39%
Professor 3 17%
Student > Master 3 17%
Other 2 11%
Student > Bachelor 1 6%
Other 2 11%

SpringerLink Download summary

This chapter has been downloaded a total of 841 times.