A comprehensive security analysis of the TUAK algorithm set

TitleA comprehensive security analysis of the TUAK algorithm set
Publication TypeJournal Article
Year of Publication2015
AuthorsMandal, K., Y. Tan, T. Wu, and G. Gong
JournalIEEE Transactions on Information Forensics and Security
Date PublishedSeptember/2015
Reprint EditionTechnical Report CACR 2016-01, University of Waterloo