Login / Signup
Biclique Attack on the Full HIGHT.
Deukjo Hong
Bonwook Koo
Daesung Kwon
Published in:
ICISC (2011)
Keyphrases
</>
countermeasures
graph theoretic
secret key
data mining
malicious attacks
detection mechanism
digital watermark
real time
image sequences
ddos attacks
denial of service attacks
abstract argumentation
attack scenarios