Return to Article Details Algorithm substitution attacks on symmetric encryption: a survey Download Download PDF