Login / Signup

All-subkeys-recovery attacks on a variation of Feistel-2 block ciphers.

Dong YangWen-Feng QiTian Tian
Published in: IET Inf. Secur. (2017)
Keyphrases
  • block cipher
  • s box
  • hash functions
  • secret key
  • lightweight
  • power analysis
  • security protocols
  • application layer
  • end to end