Login / Signup
Impossible Differential Attacks on 13-Round CLEFIA-128.
Hamid Mala
Mohammad Dakhilalian
Mohsen Shakiba
Published in:
J. Comput. Sci. Technol. (2011)
Keyphrases
</>
block cipher
countermeasures
differential power analysis
security threats
malicious users
attack detection
malicious attacks
digital image watermarking
denial of service attacks
chosen plaintext
data sets
traffic analysis
s box
security protocols
security mechanisms
case study
data mining