Login / Signup
New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers.
Takanori Isobe
Kyoji Shibutani
Published in:
ASIACRYPT (1) (2017)
Keyphrases
</>
block cipher
hash functions
chosen plaintext
secret key
stream cipher
lightweight
s box
security protocols
neural network
database
data mining
image recovery
traffic analysis