Login / Signup
Using Volunteer Computing for Mounting SAT-based Cryptographic Attacks.
Alexander A. Semenov
Oleg Zaikin
Ilya V. Otpuschennikov
Published in:
CoRR (2014)
Keyphrases
</>
security protocols
differential power analysis
smart card
answer set programming
cryptographic algorithms
watermarking scheme
learning algorithm
orders of magnitude
security mechanisms
version space
stream cipher