Cite
Security Analysis of Cipher ICEBERG against Bit-pattern Based Integral Attack
MLA
Wang, Xu, et al. “Security Analysis of Cipher ICEBERG against Bit-Pattern Based Integral Attack.” International Journal of Technology and Human Interaction, vol. 12, no. 2, Apr. 2016, pp. 60–71. EBSCOhost, https://doi.org/10.4018/IJTHI.2016040105.
APA
Wang, X., Wei, Y., & Rong, Y. (2016). Security Analysis of Cipher ICEBERG against Bit-pattern Based Integral Attack. International Journal of Technology and Human Interaction, 12(2), 60–71. https://doi.org/10.4018/IJTHI.2016040105
Chicago
Wang, Xu, Yuechuan Wei, and Yisheng Rong. 2016. “Security Analysis of Cipher ICEBERG against Bit-Pattern Based Integral Attack.” International Journal of Technology and Human Interaction 12 (2): 60–71. doi:10.4018/IJTHI.2016040105.