Login / Signup
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version).
Christina Boura
María Naya-Plasencia
Valentin Suder
Published in:
IACR Cryptol. ePrint Arch. (2014)
Keyphrases
</>
countermeasures
databases
information systems
knowledge base
image processing
video sequences
computer security