Sign in

SoK: On DFA Vulnerabilities of Substitution-Permutation Networks.

Mustafa KhairallahXiaolu HouZakaria NajmJakub BreierShivam BhasinThomas Peyrin
Published in: AsiaCCS (2019)
Keyphrases
  • social networks
  • heterogeneous networks
  • bayesian networks
  • information security
  • computer networks
  • network analysis
  • cellular networks
  • network size
  • network structure
  • telecommunication networks