Login / Signup
On the behaviors of affine equivalent Sboxes regarding differential and linear attacks.
Anne Canteaut
Joëlle Roué
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
malicious behavior
malicious attacks
affine transformation
cooperative
countermeasures
linearly separable
malicious users
piecewise affine
data sets
neural network
image registration
affine invariant
computer security
attack detection