Login / Signup
Total break of Zorro using linear and differential attacks.
Shahram Rasoolzadeh
Zahra Ahmadian
Mahmoud Salmasizadeh
Mohammad Reza Aref
Published in:
ISC Int. J. Inf. Secur. (2014)
Keyphrases
</>
countermeasures
neural network
image processing
closed form
data sets
genetic algorithm
multistage
piecewise linear
transfer function
linear systems
traffic analysis
malicious users