Login / Signup

Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon.

Christina BouraMaría Naya-PlasenciaValentin Suder
Published in: ASIACRYPT (1) (2014)
Keyphrases
  • digital images
  • computer security
  • data sets
  • search engine
  • case study
  • signal processing
  • watermarking scheme
  • security protocols
  • security threats
  • terrorist attacks
  • chosen plaintext