Sign in

Differential and Impossible Differential Related-Key Attacks on Hierocrypt-L1.

Bungo TagaShiho MoriaiKazumaro Aoki
Published in: ACISP (2014)
Keyphrases
  • neural network
  • real time
  • data mining
  • computer vision
  • information systems
  • traffic analysis