ListarArtículos (Tecnología Electrónica) por materia "Key recovery"
Mostrando ítems 1-1 de 1
-
Artículo
Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA
(MDPI, 2020-12)One of the best methods to improve the security of cryptographic systems used to exchange sensitive information is to ...