Login / Signup

When Should an Implementation Attack Be Viewed as Successful?

Werner Schindler
Published in: Number Theory and Cryptography (2013)
Keyphrases
  • hidden markov models
  • implementation issues
  • machine learning
  • efficient implementation
  • countermeasures
  • information systems
  • image processing
  • similarity measure
  • object oriented
  • implementation details