Login / Signup
Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128.
Kitae Jeong
Changhoon Lee
Jaechul Sung
Seokhie Hong
Jongin Lim
Published in:
ACISP (2007)
Keyphrases
</>
block cipher
temporal logic
closely related
data sets
databases
data mining
genetic algorithm
learning algorithm
artificial intelligence
multiscale
multiresolution
lightweight
watermarking scheme
countermeasures
chosen plaintext