


default search action
"Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack."
Jiali Choy, Khoongming Khoo, Chuan-Wen Loe (2008)
- Jiali Choy, Khoongming Khoo, Chuan-Wen Loe:
Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack. ICICS 2008: 157-173

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.