Login / Signup
On Related-Key Attacks and KASUMI: The Case of A5/3.
Phuong Ha Nguyen
Matthew J. B. Robshaw
Huaxiong Wang
Published in:
INDOCRYPT (2011)
Keyphrases
</>
real time
information retrieval
case study
traffic analysis
machine learning
website
web services
expert systems
cryptographic protocols
security threats