Login / Signup
Distinguishing Attacks on T-Functions.
Simon Künzli
Pascal Junod
Willi Meier
Published in:
Mycrypt (2005)
Keyphrases
</>
countermeasures
malicious attacks
real time
cooperative
wavelet transform
terrorist attacks
data sets
neural network
genetic algorithm
decision trees
watermarking scheme
data publishing
security risks