Login / Signup
A New Approach of Evaluating the Security Against Differential and Linear Cryptanalysis and Its Applications to Serpent, NOEKEON and ASCON.
Chunning Zhou
Wentao Zhang
Weiwei Cao
Published in:
Comput. J. (2024)
Keyphrases
</>
block cipher
s box
encryption algorithm
hash functions
lightweight
secret key
access control
security protocols
network security
security issues
database systems
similarity search
data distribution
end to end
security mechanisms