Login / Signup
Impossible Boomerang Attacks Revisited Applications to Deoxys-BC, Joltik-BC and SKINNY.
Jianing Zhang
Haoyang Wang
Deng Tang
Published in:
IACR Trans. Symmetric Cryptol. (2024)
Keyphrases
</>
countermeasures
case study
bayesian networks
watermarking scheme