Login / Signup

An Empirical Study of Key Generation in Cryptographic Ransomware.

Pranshu BajpaiRichard J. Enbody
Published in: Cyber Security (2020)
Keyphrases
  • smart card
  • hash functions
  • security properties
  • neural network
  • security protocols
  • databases
  • encryption scheme
  • data sets
  • machine learning
  • website
  • decision trees
  • encryption key
  • differential power analysis