Login / Signup
Differential Attacks: Using Alternative Operations.
Céline Blondeau
Roberto Civino
Massimiliano Sala
Published in:
IACR Cryptol. ePrint Arch. (2017)
Keyphrases
</>
countermeasures
watermarking scheme
database
databases
neural network
denial of service attacks