Login / Signup
Algebraic Meet-in-the-Middle Attack on LowMC.
Fukang Liu
Santanu Sarkar
Gaoli Wang
Willi Meier
Takanori Isobe
Published in:
ASIACRYPT (1) (2022)
Keyphrases
</>
countermeasures
data mining
learning algorithm
detection mechanism
database
computer vision
bayesian networks
encryption algorithm
abstract argumentation
attack graphs