Login / Signup

Impossible Boomerang Attacks Revisited Applications to Deoxys-BC, Joltik-BC and SKINNY.

Jianing ZhangHaoyang WangDeng Tang
Published in: IACR Trans. Symmetric Cryptol. (2024)
Keyphrases
  • countermeasures
  • case study
  • bayesian networks
  • watermarking scheme