The Boomerang Attacks on the Round-Reduced Skein-512.
Hongbo YuJiazhe ChenXiaoyun WangPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- block cipher
- countermeasures
- watermarking scheme
- significantly reduced
- artificial intelligence
- malicious users
- case study
- database
- computer security
- watermarking algorithm
- chosen plaintext
- terrorist attacks
- malicious attacks
- traffic analysis
- security threats
- dos attacks
- information systems
- genetic algorithm
- real time