Login / Signup

A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique.

Yonglin HaoDongxia BaiLeibo Li
Published in: NSS (2014)
Keyphrases
  • key exchange protocol
  • search space
  • databases
  • information retrieval
  • database
  • neural network
  • artificial intelligence
  • image processing
  • multiscale
  • significantly reduced