Login / Signup
Meet-in-the-Middle Key Recovery Attacks on a Single-Key Two-Round Even-Mansour Cipher.
Takanori Isobe
Kyoji Shibutani
Published in:
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2019)
Keyphrases
</>
block cipher
neural network
social networks
decision trees
database
data sets
information systems