Login / Signup
A Practical Key Recovery Attack on Basic TCHo.
Mathias Herrmann
Gregor Leander
Published in:
Public Key Cryptography (2009)
Keyphrases
</>
countermeasures
detection mechanism
social networks
knowledge base
database systems
relational databases
evolutionary algorithm
key technologies
malicious attacks