Login / Signup
Truncated Differential Attacks on 8-Round CRYPTON.
Jongsung Kim
Seokhie Hong
Sangjin Lee
Jung Hwan Song
Hyungjin Yang
Published in:
ICISC (2003)
Keyphrases
</>
block cipher
countermeasures
malicious attacks
security threats
attack detection
website
computer security
java card
learning algorithm
search engine
recommender systems
image watermarking
security problems
traffic analysis
data publishing
security risks