Login / Signup
Proving Resistance Against Invariant Attacks: How to Choose the Round Constants.
Christof Beierle
Anne Canteaut
Gregor Leander
Yann Rotella
Published in:
CRYPTO (2) (2017)
Keyphrases
</>
block cipher
countermeasures
attack detection
moment invariants
security protocols
watermarking scheme
traffic analysis
invariant properties
detect malicious
computer vision
quasi invariant
malicious users
malicious attacks
security risks
computer security
watermarking technique
affine transformation