Login / Signup
Nonlinear Invariant Attack: Practical Attack on Full SCREAM, iSCREAM, and Midori64.
Yosuke Todo
Gregor Leander
Yu Sasaki
Published in:
J. Cryptol. (2019)
Keyphrases
</>
countermeasures
case study
affine transformation
attack detection
key exchange protocol
attack scenarios
database
data mining
information systems
information security
secret key
authentication protocol
ddos attacks