Login / Signup
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi.
Jin Hoki
Takanori Isobe
Ryoma Ito
Fukang Liu
Kosei Sakamoto
Published in:
J. Inf. Secur. Appl. (2022)
Keyphrases
</>
block cipher
road network
search engine
solar radiation
data sets
countermeasures
computer security
remote sensing data
genetic algorithm
image processing
case study
email
remote sensing
security protocols
malicious attacks
attack detection