Login / Signup
Cryptography: How to Attack, What to Protect?
René Govaerts
Yvo Desmedt
Joos Vandewalle
Published in:
ICC (1) (1984)
Keyphrases
</>
cellular automata
countermeasures
information security
denial of service attacks
information systems
secret key
neural network
website
data protection
malicious users
key exchange protocol
encryption algorithms