Login / Signup
Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256.
Dongxia Bai
Hongbo Yu
Gaoli Wang
Xiaoyun Wang
Published in:
IET Inf. Secur. (2015)
Keyphrases
</>
countermeasures
information systems
traffic analysis
block cipher
terrorist attacks
real time
data sets
scheduling problem
digital images
improved algorithm
computer security
malicious attacks