Login / Signup
Defeating Embedded Cryptographic Protocols by Combining Second-Order with Brute Force.
Benoit Feix
Andjy Ricart
Benjamin Timon
Lucille Tordella
Published in:
CARDIS (2016)
Keyphrases
</>
brute force
cryptographic protocols
computationally expensive
standard model
embedded systems
exhaustive search
authentication protocol
computer chess
similarity measure
security protocols
optimal solution
image compression
encryption decryption