Login / Signup
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon.
Christina Boura
María Naya-Plasencia
Valentin Suder
Published in:
ASIACRYPT (1) (2014)
Keyphrases
</>
digital images
computer security
data sets
search engine
case study
signal processing
watermarking scheme
security protocols
security threats
terrorist attacks
chosen plaintext