Login / Signup
Square-like Attacks on Reduced Rounds of IDEA.
Hüseyin Demirci
Published in:
Selected Areas in Cryptography (2002)
Keyphrases
</>
countermeasures
watermarking scheme
malicious attacks
case study
traffic analysis
malicious users
real time
data sets
neural network
machine learning
database systems
wireless sensor networks
watermarking algorithm
terrorist attacks