Return to Article Details Algorithm Substitution Attacks: State Reset Detection and Asymmetric Modifications Download Download PDF