Login / Signup
Applications of Key Recovery Cube-attack-like.
Pawel Morawiecki
Josef Pieprzyk
Michal Straus
Marian Srebrny
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
neural network
information retrieval
real time
data sets
website
data structure
countermeasures
block cipher