Login / Signup
Meet-in-the-Middle Attacks on Reduced-Round QARMA-64/128.
Rongjia Li
Chenhui Jin
Published in:
Comput. J. (2018)
Keyphrases
</>
block cipher
countermeasures
watermarking scheme
differential power analysis
significantly reduced
artificial intelligence
cooperative
web applications
signal processing
lightweight
computer security
digital watermarking
traffic analysis
denial of service attacks
malicious users