Login / Signup

New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers.

Takanori IsobeKyoji Shibutani
Published in: ASIACRYPT (1) (2017)
Keyphrases
  • block cipher
  • hash functions
  • chosen plaintext
  • secret key
  • stream cipher
  • lightweight
  • s box
  • security protocols
  • neural network
  • database
  • data mining
  • image recovery
  • traffic analysis