Login / Signup
Impossible Boomerang Attacks Revisited: Applications to Deoxys-BC, Joltik-BC and SKINNY.
Jianing Zhang
Haoyang Wang
Deng Tang
Published in:
IACR Cryptol. ePrint Arch. (2024)
Keyphrases
</>
countermeasures
malicious attacks
multiresolution
traffic analysis
database
real time
multiscale
operating system
security protocols