Login / Signup

Impossible Differential Attack on Reduced-Round TWINE.

Xuexin ZhengKeting Jia
Published in: ICISC (2013)
Keyphrases
  • block cipher
  • detection mechanism
  • real world
  • countermeasures
  • machine learning
  • computer vision
  • information systems
  • knowledge base
  • anomaly detection
  • resource allocation
  • secret key
  • power analysis