Login / Signup
Differential-linear Attacks on Permutation Ciphers Revisited: Experiments on Ascon and DryGASCON.
Aslí Basak Civek
Cihangir Tezcan
Published in:
ICISSP (2022)
Keyphrases
</>
chosen plaintext
stream cipher
watermarking scheme
countermeasures
closed form
malicious attacks
security protocols
linear systems
traffic analysis
linear constraints
attack detection
denial of service attacks
block cipher
database
watermarking algorithm
digital images
multiresolution
information systems