Login / Signup
Full-Round Differential Attack on ULC and LICID Block Ciphers Designed for IoT.
Manjeet Kaur
Tarun Yadav
Manoj Kumar
Dhananjoy Dey
Published in:
IACR Cryptol. ePrint Arch. (2023)
Keyphrases
</>
block cipher
s box
hash functions
lightweight
secret key
power analysis
management system
feature extraction
application layer
power consumption
end to end
countermeasures
key management
security protocols