Security Analysis of Cipher ICEBERG against Bit-pattern Based Integral Attack.
Yuechuan WeiYisheng RongXu An WangPublished in: Int. J. Technol. Hum. Interact. (2016)
Keyphrases
- security analysis
- encryption algorithm
- block cipher
- advanced encryption standard
- secret key
- smart card
- public key
- encryption scheme
- high security
- security requirements
- authentication protocol
- stream cipher
- s box
- ciphertext
- image encryption
- security properties
- hash functions
- pseudorandom
- private key
- authentication scheme
- defense mechanisms
- lightweight
- mutual authentication
- elliptic curve cryptography
- security protocols
- information security