Sign in

A Key Recovery Attack on Edon80.

Martin HellThomas Johansson
Published in: ASIACRYPT (2007)
Keyphrases
  • countermeasures
  • neural network
  • decision making
  • database systems
  • recovery algorithm
  • machine learning
  • artificial intelligence
  • web applications
  • intrusion detection
  • block cipher