Login / Signup
New Impossible Differential Attacks on Camellia.
Dongxia Bai
Leibo Li
Published in:
ISPEC (2012)
Keyphrases
</>
countermeasures
malicious attacks
traffic analysis
malicious users
cooperative
differential power analysis
multiscale
security mechanisms
detect malicious
digital image watermarking
security threats
security protocols
chosen plaintext
neural network
computer security
signal processing
genetic algorithm