Login / Signup
Key Mismatch Attack on ThreeBears, Frodo and Round5.
Jan Vacek
Jan Václavek
Published in:
ICISC (2020)
Keyphrases
</>
block cipher
databases
hash functions
s box
neural network
artificial intelligence
computer vision
case study
real time
machine learning
search algorithm
artificial neural networks
web applications
secret key
secure communication
key exchange protocol