Login / Signup
All-subkeys-recovery attacks on a variation of Feistel-2 block ciphers.
Dong Yang
Wen-Feng Qi
Tian Tian
Published in:
IET Inf. Secur. (2017)
Keyphrases
</>
block cipher
s box
hash functions
secret key
lightweight
power analysis
security protocols
application layer
end to end