Sign in

Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-256.

Ya LiuBing ShiDawu GuFengyu ZhaoWei LiZhiqiang Liu
Published in: Comput. J. (2020)
Keyphrases
  • improved algorithm
  • terrorist attacks
  • malicious users
  • databases
  • social networks
  • information systems
  • signal processing
  • watermarking scheme
  • computer security