Login / Signup
The Boomerang Attacks on the Round-Reduced Skein-512.
Hongbo Yu
Jiazhe Chen
Xiaoyun Wang
Published in:
Selected Areas in Cryptography (2012)
Keyphrases
</>
countermeasures
block cipher
traffic analysis
digital images
data sets
information security
computer security
security protocols
security risks
malicious attacks
attack detection