Login / Signup
Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions.
Dingfeng Ye
Zongduo Dai
Kwok-Yan Lam
Published in:
J. Cryptol. (2001)
Keyphrases
</>
cellular automata
countermeasures
cryptographic algorithms
neural network
information security
security protocols
cryptographic protocols
anomaly detection
watermarking scheme
security mechanisms
ontology mapping
ddos attacks
malicious attacks