C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon.
Raghvendra Rohit
Kai Hu
Sumanta Sarkar
Siwei Sun
Published in:
IACR Cryptol. ePrint Arch. (2021)
Keyphrases
</>
block cipher
countermeasures
neural network
database
real time
network traffic
image recovery
data mining
low cost
intrusion detection system
computer security
traffic analysis
security risks
malicious attacks