On Closed-Cycle Loops and Applicability of Nonlinear Product Attacks to DES.
Nicolas T. CourtoisMatteo AbbondatiHamy RatoaninaMarek GrajekPublished in: IACR Cryptol. ePrint Arch. (2021)
Keyphrases
- complementarity problems
- nonlinear equations
- countermeasures
- watermarking scheme
- real world
- product information
- security protocols
- computer security
- product design
- watermarking algorithm
- life cycle
- database systems
- security mechanisms
- software development
- artificial neural networks
- java card
- information systems
- terrorist attacks
- neural network
- attack detection