Login / Signup
New Results on Boomerang and Rectangle Attack.
Eli Biham
Orr Dunkelman
Nathan Keller
Published in:
IACR Cryptol. ePrint Arch. (2002)
Keyphrases
</>
hough transform
countermeasures
line segments
axis parallel
malicious attacks
attack graphs
malicious users
ddos attacks
minimum bounding
secret key
detection mechanism
database
fault model
attack graph
expert systems
knowledge base
machine learning