Login / Signup
Impossible differential attack on 13-round Camellia-192.
Céline Blondeau
Published in:
Inf. Process. Lett. (2015)
Keyphrases
</>
block cipher
information retrieval
countermeasures
data sets
secret key
data mining
machine learning
information systems
database systems
denial of service attacks
malicious attacks
key exchange protocol