Login / Signup
A Key Recovery Attack on Edon80.
Martin Hell
Thomas Johansson
Published in:
ASIACRYPT (2007)
Keyphrases
</>
countermeasures
neural network
decision making
database systems
recovery algorithm
machine learning
artificial intelligence
web applications
intrusion detection
block cipher