Login / Signup
Impossible Differential Attack on Reduced-Round TWINE.
Xuexin Zheng
Keting Jia
Published in:
ICISC (2013)
Keyphrases
</>
block cipher
detection mechanism
real world
countermeasures
machine learning
computer vision
information systems
knowledge base
anomaly detection
resource allocation
secret key
power analysis