Login / Signup
A Meet-in-the-Middle Attack on the Full KASUMI.
Keting Jia
Hongbo Yu
Xiaoyun Wang
Published in:
IACR Cryptol. ePrint Arch. (2011)
Keyphrases
</>
countermeasures
real time
data sets
detection mechanism
databases
machine learning
case study
lightweight
ddos attacks
ciphertext
dos attacks
cyber attacks
denial of service attacks
attack detection
data corruption
key exchange protocol