On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks.
Anne CanteautJoëlle RouéPublished in: EUROCRYPT (1) (2015)
Keyphrases
- malicious behavior
- countermeasures
- morphological scale space
- database systems
- cooperative
- traffic analysis
- linear constraints
- affine epipolar geometry
- neural network
- piecewise affine
- terrorist attacks
- security protocols
- linear systems
- affine invariant
- least squares
- image registration
- wireless sensor networks
- information systems
- computer vision