Sign in

Extended meet-in-the-middle attacks on some Feistel constructions.

Jian GuoJérémy JeanIvica NikolicYu Sasaki
Published in: Des. Codes Cryptogr. (2016)
Keyphrases
  • countermeasures
  • traffic analysis
  • database
  • machine learning
  • artificial intelligence
  • social networks
  • security issues
  • security mechanisms
  • ddos attacks
  • terrorist attacks
  • security flaws
  • chosen plaintext