Research Article
Multiple Impossible Differential Attacks for ForkAES
Algorithm 2
Sieved expected pairs of the first attack trail.
| Inputs: arrays ; tweaks ; Value fuction ; | | Outputs: sorted arrays indexed the value of 12 bytes | (1) | for do | (2) | for do | (3) | for do | (4) | | (5) | | (6) | end for | (7) | end for | (8) | IDQUICKSORT | (9) | end for |
|