Login / Signup
High-Order Attacks Against the Exponent Splitting Protection.
Frédéric Muller
Frédéric Valette
Published in:
Public Key Cryptography (2006)
Keyphrases
</>
high order
higher order
countermeasures
low order
biometric template
information security
protection mechanisms
pairwise
lower order
multi task learning
protection scheme
markov random field
watermarking scheme
zernike moments
computer security
protection schemes
fourth order
tensor analysis
power law