Login / Signup
Boomerang Attacks on Reduced-Round Midori64.
Mehmet Emin Gönen
Muhammed Said Gündogan
Kamil Otal
Published in:
ISC Int. J. Inf. Secur. (2024)
Keyphrases
</>
countermeasures
watermarking scheme
data mining
block cipher
genetic algorithm
computer security
security risks
denial of service attacks
malicious users