Login / Signup
Nonlinear Invariant Attack -Practical Attack on Full SCREAM, iSCREAM, and Midori64.
Yosuke Todo
Gregor Leander
Yu Sasaki
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
countermeasures
attack detection
image processing
encryption algorithm
real time
data sets
real world
machine learning
information retrieval
wireless sensor networks
network security
detection mechanism
malicious users