Login / Signup
Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-boxes.
Henri Gilbert
Jérôme Plût
Joana Treger
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
block cipher
s box
encryption algorithm
power analysis
chaotic sequence
ciphertext
lightweight
hash functions
cellular automata
chaotic map
secret key
security analysis
pseudorandom
design criteria
initial conditions
private key
rfid tags
smart card