Login / Signup
Modifying an Enciphering Scheme after Deployment.
Paul Grubbs
Thomas Ristenpart
Yuval Yarom
Published in:
IACR Cryptol. ePrint Arch. (2017)
Keyphrases
</>
detection scheme
image processing
three dimensional
information systems
multimedia
data sets
feature selection
case study
data structure
optimization scheme
recognition scheme