Login / Signup

Impossible Differential Attack on 30-Round SHACAL-2.

Seokhie HongJongsung KimGuil KimJaechul SungChanghoon LeeSangjin Lee
Published in: INDOCRYPT (2003)
Keyphrases
  • block cipher
  • countermeasures
  • data sets
  • real time
  • information retrieval
  • image processing
  • web services
  • case study
  • cooperative
  • cyber attacks
  • detection mechanism
  • malicious attacks
  • attack detection