Login / Signup
Related-Key Attack on the MD-64 Block Cipher Suitable for Pervasive Computing Environments.
Jinkeon Kang
Kitae Jeong
Sang-Soo Yeo
Changhoon Lee
Published in:
AINA Workshops (2012)
Keyphrases
</>
block cipher
hash functions
secret key
s box
lightweight
power analysis
pervasive computing environments
wireless sensor networks
application layer
artificial intelligence
data analysis
data warehouse
mobile agents
ad hoc networks