Login / Signup
Attacks on Round-Reduced BLAKE.
Ji Li
Liangyu Xu
Published in:
IACR Cryptol. ePrint Arch. (2009)
Keyphrases
</>
block cipher
countermeasures
case study
security protocols
malicious attacks
real time
genetic algorithm
watermarking scheme
java card