Login / Signup
Attack on Six Rounds of Crypton.
Carl D'Halluin
Gert Bijnens
Vincent Rijmen
Bart Preneel
Published in:
FSE (1999)
Keyphrases
</>
countermeasures
genetic algorithm
bayesian networks
key exchange protocol
attack scenarios
data sets
data mining
computer vision
secret key
power analysis