Login / Signup
Single key MITM attack and biclique cryptanalysis of full round Khudra.
Prakash Dey
Raghvendra Singh Rohit
Avishek Adhikari
Published in:
J. Inf. Secur. Appl. (2018)
Keyphrases
</>
block cipher
hash functions
secret key
lightweight
s box
power analysis
data mining
database
data sets
social networks
knowledge base
evolutionary algorithm
graph theoretic