Login / Signup
Cube-like Attack on Round-Reduced Initialization of Ketje Sr.
Xiaoyang Dong
Zheng Li
Xiaoyun Wang
Ling Qin
Published in:
IACR Cryptol. ePrint Arch. (2017)
Keyphrases
</>
block cipher
super resolution
countermeasures
initial conditions
low resolution
malicious attacks
attack detection
real time
data sets
databases
neural network
database systems
power analysis
malicious users