Login / Signup

Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256.

Dongxia BaiHongbo YuGaoli WangXiaoyun Wang
Published in: IET Inf. Secur. (2015)
Keyphrases
  • countermeasures
  • information systems
  • traffic analysis
  • block cipher
  • terrorist attacks
  • real time
  • data sets
  • scheduling problem
  • digital images
  • improved algorithm
  • computer security
  • malicious attacks