Login / Signup
Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions.
Hao Guo
Siwei Sun
Danping Shi
Ling Sun
Yao Sun
Lei Hu
Meiqin Wang
Published in:
IACR Cryptol. ePrint Arch. (2020)
Keyphrases
</>
block cipher
s box
chaotic map
design criteria
chaotic sequence
hash functions
lightweight
countermeasures
security protocols
image encryption algorithm