Login / Signup
Algebraic Side-Channel Attack on Twofish.
Chujiao Ma
John A. Chandy
Zhijie Shi
Published in:
J. Internet Serv. Inf. Secur. (2017)
Keyphrases
</>
countermeasures
power analysis
secret key
smart card
information security
higher order
attack graphs
cyber attacks
attack graph
databases
authentication protocol
algebraic geometry
security measures
algebraic structure
block cipher
mathematical theory
computer vision
social networks
real world