Resilience to distinguishing attacks on WG-7 cipher and their generalizations.
Guang GongMark D. AagaardXinxin FanPublished in: Cryptogr. Commun. (2013)
Keyphrases
- stream cipher
- block cipher
- advanced encryption standard
- countermeasures
- traffic analysis
- missing data
- denial of service attacks
- security threats
- data corruption
- hash functions
- secret key
- malicious users
- digital watermarking
- malicious attacks
- pseudorandom
- attack detection
- s box
- neural network
- dos attacks
- ddos attacks
- security protocols
- lightweight
- signal processing