Login / Signup
Time-Memory Trade-Off Attacks on Multiplications and T-Functions.
Joydip Mitra
Palash Sarkar
Published in:
ASIACRYPT (2004)
Keyphrases
</>
trade off
memory usage
computing power
memory space
security risks
data sets
computational power
countermeasures
traffic analysis
malicious users
neural network
data mining
image watermarking
security threats
data corruption