Login / Signup

Total break of Zorro using linear and differential attacks.

Shahram RasoolzadehZahra AhmadianMahmoud SalmasizadehMohammad Reza Aref
Published in: ISC Int. J. Inf. Secur. (2014)
Keyphrases
  • countermeasures
  • neural network
  • image processing
  • closed form
  • data sets
  • genetic algorithm
  • multistage
  • piecewise linear
  • transfer function
  • linear systems
  • traffic analysis
  • malicious users