Login / Signup
Preventing Zeroizing Attacks on GGH15.
James Bartusek
Jiaxin Guan
Fermi Ma
Mark Zhandry
Published in:
IACR Cryptol. ePrint Arch. (2018)
Keyphrases
</>
countermeasures
chosen plaintext
security protocols
security risks
cryptographic protocols
differential power analysis
malicious attacks
computer security
case study
neural network
traffic analysis
watermarking method
watermarking technique
denial of service attacks
smart card
attack detection
website