Login / Signup

Forgery Attacks on Round-Reduced ICEPOLE-128.

Christoph DobraunigMaria EichlsederFlorian Mendel
Published in: SAC (2015)
Keyphrases
  • block cipher
  • digital images
  • countermeasures
  • malicious attacks
  • traffic analysis
  • security protocols
  • data sets
  • neural network
  • attack detection