Login / Signup
Attack on the Full MISTY1.
Achiya Bar-On
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
countermeasures
databases
attack detection
denial of service attacks
lightweight
search algorithm
real time
website
wireless sensor networks
artificial intelligence
real world
detection mechanism
neural network
malicious attacks
attack graph
malicious users
attack scenarios