Applying cube attacks to stream ciphers in realistic scenarios

date of publication:  2012-08-19
n.uris is undefined

Article -

Welcome to Inventaire

the library of your friends and communities
learn more
you are offline