Login / Signup

Differential attacks: using alternative operations.

Roberto CivinoCéline BlondeauMassimiliano Sala
Published in: Des. Codes Cryptogr. (2019)
Keyphrases
  • watermarking scheme
  • countermeasures
  • database
  • neural network
  • cooperative
  • genetic algorithm
  • artificial intelligence
  • image processing
  • computer security
  • malicious attacks
  • security vulnerabilities
  • detecting malicious