Login / Signup
Slide Attacks with a Known-Plaintext Cryptanalysis.
Soichi Furuya
Published in:
ICISC (2001)
Keyphrases
</>
block cipher
stream cipher
secret key
chosen plaintext
hash functions
s box
smart card
ciphertext
lightweight
countermeasures
public key
security analysis
encryption scheme
security protocols
encryption algorithm
authentication scheme
security threats
signature scheme
traffic analysis
malicious attacks
low cost