Meet-in-the-Middle Attacks on Round-Reduced Khudra.
Mohamed TolbaAhmed AbdelkhalekAmr M. YoussefPublished in: SPACE (2015)
Keyphrases
- block cipher
- countermeasures
- malicious attacks
- image watermarking
- differential power analysis
- security mechanisms
- security protocols
- stepping stones
- detect malicious
- terrorist attacks
- denial of service attacks
- watermarking method
- security problems
- real time
- watermarking algorithm
- lightweight
- signal processing
- multiscale
- image sequences
- information retrieval
- data sets