Login / Signup
Related-Key Boomerang Attacks on KATAN32/48/64.
Takanori Isobe
Yu Sasaki
Jiageng Chen
Published in:
ACISP (2013)
Keyphrases
</>
operating system
computer systems
countermeasures
neural network
decision trees
database systems
closely related
image watermarking
digital image watermarking