Sign in

Key Recovery Attack Against 2.5-Round \pi -Cipher.

Christina BouraAvik ChakrabortiGaëtan LeurentGoutam PaulDhiman SahaHadi SoleimanyValentin Suder
Published in: FSE (2016)
Keyphrases
  • block cipher
  • s box
  • secret key
  • hash functions
  • lightweight
  • power analysis
  • database
  • evolutionary algorithm
  • intrusion detection
  • multistage