Sign in
Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM, and Midori64.
Yosuke Todo
Gregor Leander
Yu Sasaki
Published in:
ASIACRYPT (2) (2016)
Keyphrases
</>
countermeasures
real world
practical application
malicious attacks
attack detection
affine transformation
real time
case study
secret key
fourier domain
power analysis
abstract argumentation