Login / Signup
Forgery Attacks on Round-Reduced ICEPOLE-128.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
Published in:
SAC (2015)
Keyphrases
</>
block cipher
digital images
countermeasures
malicious attacks
traffic analysis
security protocols
data sets
neural network
attack detection