Login / Signup
Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-256.
Akshima
Donghoon Chang
Mohona Ghosh
Aarushi Goel
Somitra Kumar Sanadhya
Published in:
INDOCRYPT (2015)
Keyphrases
</>
modular design
block cipher
improved algorithm
countermeasures
real world
neural network
information systems
decision trees
case study
digital images
security mechanisms
attack detection
detect malicious
chosen plaintext