Login / Signup
A Meet-in-the-Middle Attack on ARIA.
Xuehai Tang
Bing Sun
Ruilin Li
Chao Li
Published in:
IACR Cryptol. ePrint Arch. (2010)
Keyphrases
</>
modular design
countermeasures
recommender systems
dos attacks
detection mechanism
data sets
social networks
feature selection
decision trees
lightweight
ddos attacks
encryption algorithm
malicious users
data corruption
attack graphs