Login / Signup
Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon.
Raghvendra Rohit
Kai Hu
Sumanta Sarkar
Siwei Sun
Published in:
IACR Cryptol. ePrint Arch. (2021)
Keyphrases
</>
block cipher
countermeasures
neural network
database
real time
network traffic
image recovery
data mining
low cost
intrusion detection system
computer security
traffic analysis
security risks
malicious attacks