Login / Signup
Cryptanalysis of Two New Instances of TTM Cryptosystem.
Xuyun Nie
Xin Jiang
Lei Hu
Jintai Ding
Published in:
IACR Cryptol. ePrint Arch. (2007)
Keyphrases
</>
cellular automata
training instances
hash functions
elliptic curve
real time
lower bound
integer programming
randomly generated
lower and upper bounds
search procedures