Login / Signup
Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-Boxes.
Henri Gilbert
Jérôme Plût
Joana Treger
Published in:
CRYPTO (1) (2015)
Keyphrases
</>
block cipher
s box
power analysis
encryption algorithm
chaotic sequence
hash functions
chaotic map
ciphertext
secret key
pseudorandom
design criteria
cellular automata
lightweight
private key
smart card
low cost
countermeasures
control algorithm
efficient implementation