Login / Signup
The Cryptanalysis of the Enigma Cipher. The Plugboard and the Cryptologic Bomb.
Anna Borowska
Elzbieta Rzeszutko
Published in:
Comput. Sci. (2014)
Keyphrases
</>
block cipher
secret key
lightweight
s box
hash functions
stream cipher
scatter search
data sets
application layer
databases
digital libraries
image processing
database
public key
information systems
initial conditions
neural network