Sign Up to like & get
recommendations!
1
Published in 2018 at "Wuhan University Journal of Natural Sciences"
DOI: 10.1007/s11859-018-1359-1
Abstract: Key-recovery technology is often used by an adversary to attempt to recover the cryptographic key of an encryption scheme. The most obvious key-recovery attack is the exhaustive key-search attack. But modern ciphers often have a…
read more here.
Keywords:
attack;
recovery;
way improve;
side channel ... See more keywords