A MeetintheMiddle Attack on ReducedRound SNAKE(2)
WEI Yuechuan1,SUN Bing2,LI Chao1,2,3
(1.School of Computer Science,National University of Defense Technology,Changsha 410073;
2.School of Science,National University of Defense Technology,Changsha 410073;
3.State Key Laboratory of Information Security,Chinese Academy of Sciences,Beijing 100049,China)