Login / Signup

Related-Key Boomerang Attacks on KATAN32/48/64.

Takanori IsobeYu SasakiJiageng Chen
Published in: ACISP (2013)
Keyphrases
  • operating system
  • computer systems
  • countermeasures
  • neural network
  • decision trees
  • database systems
  • closely related
  • image watermarking
  • digital image watermarking