Login / Signup

The Boomerang Attacks on the Round-Reduced Skein-512.

Hongbo YuJiazhe ChenXiaoyun Wang
Published in: Selected Areas in Cryptography (2012)
Keyphrases
  • countermeasures
  • block cipher
  • traffic analysis
  • digital images
  • data sets
  • information security
  • computer security
  • security protocols
  • security risks
  • malicious attacks
  • attack detection