Login / Signup

On Related-Key Attacks and KASUMI: The Case of A5/3.

Phuong Ha NguyenMatthew J. B. RobshawHuaxiong Wang
Published in: INDOCRYPT (2011)
Keyphrases
  • real time
  • information retrieval
  • case study
  • traffic analysis
  • machine learning
  • website
  • web services
  • expert systems
  • cryptographic protocols
  • security threats