Login / Signup
Key Recovery Attack Against 2.5-Round \pi -Cipher.
Christina Boura
Avik Chakraborti
Gaëtan Leurent
Goutam Paul
Dhiman Saha
Hadi Soleimany
Valentin Suder
Published in:
FSE (2016)
Keyphrases
</>
block cipher
s box
secret key
hash functions
lightweight
power analysis
database
evolutionary algorithm
intrusion detection
multistage