Login / Signup

Impossible differential attack on 13-round Camellia-192.

Céline Blondeau
Published in: Inf. Process. Lett. (2015)
Keyphrases
  • block cipher
  • information retrieval
  • countermeasures
  • data sets
  • secret key
  • data mining
  • machine learning
  • information systems
  • database systems
  • denial of service attacks
  • malicious attacks
  • key exchange protocol