Sign in

Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM, and Midori64.

Yosuke TodoGregor LeanderYu Sasaki
Published in: ASIACRYPT (2) (2016)
Keyphrases
  • countermeasures
  • real world
  • practical application
  • malicious attacks
  • attack detection
  • affine transformation
  • real time
  • case study
  • secret key
  • fourier domain
  • power analysis
  • abstract argumentation