Login / Signup
Forgery Attacks on round-reduced ICEPOLE-128.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
digital images
block cipher
security threats
countermeasures
traffic analysis
denial of service attacks
computer security
java card
attack detection