Login / Signup

Three-Subset Meet-in-the-Middle Attack on Reduced XTEA.

Yu SasakiLei WangYasuhide SakaiKazuo SakiyamaKazuo Ohta
Published in: AFRICACRYPT (2012)
Keyphrases
  • countermeasures
  • artificial intelligence
  • detection mechanism
  • malicious attacks
  • data sets
  • databases
  • data mining
  • database systems
  • cooperative
  • expert systems
  • multistage
  • routing protocol
  • key exchange protocol