Login / Signup
Key Recovery Attack against 2.5-round pi-Cipher.
Christina Boura
Avik Chakraborti
Gaëtan Leurent
Goutam Paul
Dhiman Saha
Hadi Soleimany
Valentin Suder
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
block cipher
secret key
hash functions
s box
lightweight
power analysis
neural network
smart card
databases
countermeasures