Login / Signup

Linear Distinguishing Attack on Shannon.

Risto M. HakalaKaisa Nyberg
Published in: ACISP (2008)
Keyphrases
  • information theory
  • real time
  • machine learning
  • countermeasures
  • malicious users
  • data sets
  • computer vision
  • bayesian networks
  • information theoretic
  • closed form
  • linear model
  • simple linear
  • key exchange protocol