Login / Signup
A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique.
Yonglin Hao
Dongxia Bai
Leibo Li
Published in:
NSS (2014)
Keyphrases
</>
key exchange protocol
search space
databases
information retrieval
database
neural network
artificial intelligence
image processing
multiscale
significantly reduced