Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos.
Mostafizar RahmanDhiman SahaGoutam PaulPublished in: IACR Trans. Symmetric Cryptol. (2021)
Keyphrases
- block cipher
- vector space
- watermarking algorithm
- advanced encryption standard
- countermeasures
- cryptographic algorithms
- security threats
- high dimensional
- watermarking scheme
- security mechanisms
- watermarking technique
- security protocols
- nonlinear dimensionality reduction
- security risks
- data encryption standard
- blind watermarking