Login / Signup
Practical Related-Key Forgery Attacks on the Full TinyJAMBU-192/256.
Orr Dunkelman
Eran Lambooij
Shibam Ghosh
Published in:
IACR Cryptol. ePrint Arch. (2022)
Keyphrases
</>
digital images
neural network
database
data sets
website
closely related
countermeasures
real world
social networks
block cipher
terrorist attacks
malicious users