Login / Signup
Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT.
Hosein Hadipour
Patrick Derbez
Maria Eichlseder
Published in:
CRYPTO (4) (2024)
Keyphrases
</>
block cipher
encryption algorithm
b spline
feature space
s box
cryptographic algorithms