Login / Signup
Revisiting the Boomerang Attack from a Perspective of 3-differential.
Libo Wang
Ling Song
Baofeng Wu
Mostafizar Rahman
Takanori Isobe
Published in:
IACR Cryptol. ePrint Arch. (2023)
Keyphrases
</>
viewpoint
neural network
computer vision
search algorithm
secret key
detection mechanism
databases
expert systems
wireless sensor networks
countermeasures
key exchange protocol