Login / Signup
Integral Attacks on Round-Reduced Bel-T-256.
Muhammad ElSheikh
Mohamed Tolba
Amr M. Youssef
Published in:
SAC (2018)
Keyphrases
</>
countermeasures
block cipher
watermarking scheme
neural network
information systems
malicious attacks
digital images
computer security
security threats
traffic analysis