Login / Signup

A Practical Key Recovery Attack on Basic TCHo.

Mathias HerrmannGregor Leander
Published in: Public Key Cryptography (2009)
Keyphrases
  • countermeasures
  • detection mechanism
  • social networks
  • knowledge base
  • database systems
  • relational databases
  • evolutionary algorithm
  • key technologies
  • malicious attacks