Login / Signup
On the Success of the Embedding Attack on the Alternating Step Generator.
Jovan Dj. Golic
Published in:
Selected Areas in Cryptography (2003)
Keyphrases
</>
post processing
data sets
data mining