Login / Signup
Rebound Attack on JH42.
María Naya-Plasencia
Deniz Toz
Kerem Varici
Published in:
ASIACRYPT (2011)
Keyphrases
</>
countermeasures
secret key
artificial neural networks
attack detection
data mining
information systems
digital libraries
encryption algorithm
power analysis
attack graph
malicious users
attack scenarios
attack graphs