Login / Signup
Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3.
Ahmed Abdelkhalek
Riham AlTawy
Mohamed Tolba
Amr M. Youssef
Published in:
LATINCRYPT (2015)
Keyphrases
</>
block cipher
countermeasures
significantly reduced
data sets
image sequences
watermarking scheme
security protocols
malicious attacks
real time
databases
learning algorithm
artificial intelligence
case study
traffic analysis