Login / Signup
Key recovery attacks on reduced-round Joltik-BC in the single-key setting.
Rongjia Li
Chenhui Jin
Hongchen Pan
Published in:
Inf. Process. Lett. (2019)
Keyphrases
</>
block cipher
database
website
case study
real time
genetic algorithm
database systems
relational databases
information security
countermeasures