Login / Signup
Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints.
Danping Shi
Siwei Sun
Patrick Derbez
Yosuke Todo
Bing Sun
Lei Hu
Published in:
IACR Cryptol. ePrint Arch. (2018)
Keyphrases
</>
programming language
constraint satisfaction
linear constraints
databases
constrained optimization
data mining
object oriented
constraint networks
development environment
secret key
malicious users