Sign in

Vectorized linear approximations for attacks on SNOW 3G.

Jing YangThomas JohanssonAlexander Maximov
Published in: IACR Trans. Symmetric Cryptol. (2019)
Keyphrases
  • closed form
  • multiscale
  • image watermarking
  • traffic analysis
  • linear functions
  • computer security
  • low order
  • linear approximation
  • website
  • signal processing
  • taylor series