Return to Article Details Distinguishing Attack on NORX Permutation Download Download PDF