Login / Signup
Meet in the Middle Attacks on Reduced Round Kuznyechik.
Riham AlTawy
Amr M. Youssef
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
block cipher
countermeasures
real time
watermarking scheme
malicious users
malicious attacks
genetic algorithm
network security
significantly reduced
watermarking algorithm
digital watermarking
traffic analysis
denial of service attacks
chosen plaintext