Login / Signup
New impossible differential attacks on reduced-round Crypton.
Hamid Mala
Mohsen Shakiba
Mohammad Dakhilalian
Published in:
Comput. Stand. Interfaces (2010)
Keyphrases
</>
block cipher
countermeasures
databases
watermarking scheme
malicious users
database systems
security mechanisms
traffic analysis
denial of service attacks
malicious attacks