Login / Signup
Cryptanalysis of an E0-like Combiner with Memory.
Yi Lu
Serge Vaudenay
Published in:
J. Cryptol. (2008)
Keyphrases
</>
memory requirements
computing power
memory usage
random access
data mining
hash functions
low memory
scatter search
external memory
limited memory
memory space
objective function
lightweight
computational complexity
pattern recognition
learning environment
case study
memory size
web services