Return to Article Details
Beyond-Birthday-Bound Security for 4-round Linear Substitution-Permutation Networks
Download
Download PDF