Login / Signup

Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack.

Jiali ChoyKhoongming KhooChuan-Wen Loe
Published in: ICICS (2008)
Keyphrases