Login / Signup

Attack on Six Rounds of Crypton.

Carl D'HalluinGert BijnensVincent RijmenBart Preneel
Published in: FSE (1999)
Keyphrases
  • countermeasures
  • genetic algorithm
  • bayesian networks
  • key exchange protocol
  • attack scenarios
  • data sets
  • data mining
  • computer vision
  • secret key
  • power analysis