Login / Signup
A Note on Related-Tweakey Impossible Differential Attacks.
Xavier Bonnetain
Virginie Lallemand
Published in:
IACR Cryptol. ePrint Arch. (2024)
Keyphrases
</>
neural network
countermeasures
search engine
computer vision
information systems
case study
similarity measure
digital images
closely related
traffic analysis