Login / Signup

Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints.

Danping ShiSiwei SunPatrick DerbezYosuke TodoBing SunLei Hu
Published in: ASIACRYPT (2) (2018)
Keyphrases
  • programming language
  • constraint programming
  • constraint satisfaction
  • real time
  • search engine
  • search algorithm
  • countermeasures
  • programming environment
  • databases
  • data mining
  • malicious users