Login / Signup
Linear Distinguishing Attack on Shannon.
Risto M. Hakala
Kaisa Nyberg
Published in:
ACISP (2008)
Keyphrases
</>
information theory
real time
machine learning
countermeasures
malicious users
data sets
computer vision
bayesian networks
information theoretic
closed form
linear model
simple linear
key exchange protocol