Comparison of Meet-in-the-middle Attacks on 2-DES and 2-AES with Four Scenarios | IEEE Conference Publication | IEEE Xplore