Login / Signup
The Resistance of PRESENT-80 Against Related-Key Differential Attacks.
Sareh Emami
San Ling
Ivica Nikolic
Josef Pieprzyk
Huaxiong Wang
Published in:
IACR Cryptol. ePrint Arch. (2013)
Keyphrases
</>
countermeasures
neural network
database
data sets
databases
data mining
video sequences
closely related
denial of service attacks
malicious users