Login / Signup
New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256.
Jiazhe Chen
Keting Jia
Hongbo Yu
Xiaoyun Wang
Published in:
ACISP (2011)
Keyphrases
</>
block cipher
real time
data sets
neural network
case study
multiresolution
signal processing
operating system
watermarking scheme
significantly reduced
countermeasures
security mechanisms
denial of service attacks