Login / Signup
Impossible Differential Attack on 30-Round SHACAL-2.
Seokhie Hong
Jongsung Kim
Guil Kim
Jaechul Sung
Changhoon Lee
Sangjin Lee
Published in:
INDOCRYPT (2003)
Keyphrases
</>
block cipher
countermeasures
data sets
real time
information retrieval
image processing
web services
case study
cooperative
cyber attacks
detection mechanism
malicious attacks
attack detection