Login / Signup
Vectorized linear approximations for attacks on SNOW 3G.
Jing Yang
Thomas Johansson
Alexander Maximov
Published in:
IACR Cryptol. ePrint Arch. (2019)
Keyphrases
</>
closed form
low order
linear functions
data sets
data mining
cooperative
linear constraints
approximation methods
taylor series
image processing
linear systems
malicious attacks