Login / Signup
Towards Fast Correlation Attacks on Irregularly Clocked Shift Registers.
Jovan Dj. Golic
Published in:
EUROCRYPT (1995)
Keyphrases
</>
countermeasures
correlation coefficient
traffic analysis
security protocols
smart card
low power
watermarking scheme
computer security
chosen plaintext
data sets
malicious users
malicious attacks
cyber attacks
security mechanisms
high speed
case study
learning algorithm
genetic algorithm