Login / Signup
Algebraic Attacks on RAIN and AIM Using Equivalent Representations.
Fukang Liu
Mohammad Mahzoun
Published in:
IACR Cryptol. ePrint Arch. (2023)
Keyphrases
</>
malicious attacks
feature detection
watermarking scheme
linear algebra
computer security
malicious users
higher order
higher level
java card
traffic analysis
data publishing
denial of service attacks
terrorist attacks