Login / Signup

Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik.

Mohamed TolbaAmr M. Youssef
Published in: ICISC (2017)
Keyphrases
  • artificial intelligence
  • improved algorithm
  • countermeasures
  • block cipher
  • malicious attacks
  • data sets
  • knowledge base
  • database systems
  • digital images