Login / Signup
Three-Subset Meet-in-the-Middle Attack on Reduced XTEA.
Yu Sasaki
Lei Wang
Yasuhide Sakai
Kazuo Sakiyama
Kazuo Ohta
Published in:
AFRICACRYPT (2012)
Keyphrases
</>
countermeasures
artificial intelligence
detection mechanism
malicious attacks
data sets
databases
data mining
database systems
cooperative
expert systems
multistage
routing protocol
key exchange protocol