Login / Signup
Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-256.
Ya Liu
Bing Shi
Dawu Gu
Fengyu Zhao
Wei Li
Zhiqiang Liu
Published in:
Comput. J. (2020)
Keyphrases
</>
improved algorithm
terrorist attacks
malicious users
databases
social networks
information systems
signal processing
watermarking scheme
computer security