Login / Signup
The distinguishing attack on Speck, Simon, Simeck, HIGHT and LEA.
Boris Ryabko
Aleksandr Soskov
Published in:
IACR Cryptol. ePrint Arch. (2018)
Keyphrases
</>
real time
cooperative
countermeasures
malicious attacks
database
databases
artificial intelligence
information systems
secret key
power analysis
attack detection
attack scenarios