Login / Signup
Attack on RC6.
Masahiko Takenaka
Takeshi Shimoyama
Takeshi Koshiba
Published in:
ACISP (2003)
Keyphrases
</>
countermeasures
malicious attacks
malicious users
floating point
secret key
neural network
machine learning
decision trees
artificial neural networks
cyber attacks
block cipher
power analysis
attack detection
attack graph
abstract argumentation