Login / Signup

Integral Attacks on Round-Reduced Bel-T-256.

Muhammad ElSheikhMohamed TolbaAmr M. Youssef
Published in: SAC (2018)
Keyphrases
  • countermeasures
  • block cipher
  • watermarking scheme
  • neural network
  • information systems
  • malicious attacks
  • digital images
  • computer security
  • security threats
  • traffic analysis