Attack on the Perturbed Matsumoto-Imai Cryptosystem.
Jintai DingJason E. GowerDieter SchmidtChristopher WolfZhijun YinPublished in: IMACC (2005)
Keyphrases
- power analysis
- encryption algorithm
- ciphertext
- countermeasures
- cellular automata
- smart card
- public key cryptosystem
- elliptic curve
- secret key
- malicious attacks
- original data
- denial of service attacks
- neural network
- key distribution
- learning algorithm
- image encryption
- data sets
- intrusion detection
- case study
- detection mechanism
- attack detection
- malicious users