Login / Signup

Distinguishing Attacks on T-Functions.

Simon KünzliPascal JunodWilli Meier
Published in: Mycrypt (2005)
Keyphrases
  • countermeasures
  • malicious attacks
  • real time
  • cooperative
  • wavelet transform
  • terrorist attacks
  • data sets
  • neural network
  • genetic algorithm
  • decision trees
  • watermarking scheme
  • data publishing
  • security risks