Login / Signup

Boomerang Attacks on Reduced-Round Midori64.

Mehmet Emin GönenMuhammed Said GündoganKamil Otal
Published in: ISC Int. J. Inf. Secur. (2024)
Keyphrases
  • countermeasures
  • watermarking scheme
  • data mining
  • block cipher
  • genetic algorithm
  • computer security
  • security risks
  • denial of service attacks
  • malicious users