Login / Signup
Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V.
Jin Hoki
Takanori Isobe
Ryoma Ito
Fukang Liu
Kosei Sakamoto
Published in:
ACISP (2021)
Keyphrases
</>
block cipher
countermeasures
genetic algorithm
search engine
error detection
malicious attacks
terrorist attacks
malicious users