Search for persons
X
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
2
Related-Tweak and Related-Key Differential Attacks on HALFL..:
, In:
?
Selected Areas in Cryptography; Lecture Notes in Computer Science ,
12