Login / Signup
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos.
Mostafizar Rahman
Dhiman Saha
Goutam Paul
Published in:
IACR Cryptol. ePrint Arch. (2022)
Keyphrases
</>
block cipher
cryptographic algorithms
watermarking algorithm
countermeasures
advanced encryption standard
data encryption standard
access control
vector space
secret key
blind watermarking
watermarking scheme
data hiding
watermarking technique