Login / Signup
On the Efficacy of Differential Cryptanalysis Attacks on K-Cipher.
Michael Kounavis
Published in:
ISCC (2023)
Keyphrases
</>
block cipher
stream cipher
secret key
s box
hash functions
advanced encryption standard
lightweight
security protocols
data sets
application layer
cooperative
similarity search
privacy preserving
metaheuristic
smart card
authentication scheme