“…Using the sieve method based on rapid sorting, select 2 m+8 × (2 m+8 − 1)÷2 × 2 − 160 ≈ 2 2m− 145 pairs of (C 0 , y AK 8 ), where Δy SB 8,(0,1,2,3) ≠ 0 and ΔC SB 0,(0,1,2,3,4,5,6,7) ≠ 0, and the difference value of the other 20 bytes is zero; then, store the ordered texts (C 0, (8,9,10,11,12,13,14,15) , y SB 8,(0,1,2,3) ) in Table Ω 3 . For the second attack trail, attackers use the same 2 m known plaintexts, select 2 8 tweaks that take all possible values in T (2) , and fix the other 7 bytes to constant values.…”