Login / Signup
Proving Resistance against Invariant Attacks: How to Choose the Round Constants.
Christof Beierle
Anne Canteaut
Gregor Leander
Yann Rotella
Published in:
IACR Cryptol. ePrint Arch. (2017)
Keyphrases
</>
block cipher
affine transformation
countermeasures
malicious attacks
malicious users
affine invariant
security mechanisms
neural network
watermarking scheme
invariant features
security threats
data mining
computer vision
traffic analysis
denial of service attacks
detect malicious