Return to Article Details
On Boomerang Attacks on Quadratic Feistel Ciphers
Download
Download PDF