Buscar
Mostrando ítems 1-1 de 1
Artículo
Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA
(MDPI, 2020-12)
One of the best methods to improve the security of cryptographic systems used to exchange sensitive information is to attack them to find their vulnerabilities and to strengthen them in subsequent designs. Trivium stream ...