Login / Signup

Conditional Estimators: An Effective Attack on A5/1.

Elad BarkanEli Biham
Published in: Selected Areas in Cryptography (2005)
Keyphrases
  • neural network
  • information systems
  • real time
  • real world
  • website
  • countermeasures