equivalent key attack algorithm 等效密钥攻击算法
Information Hiding Attack Algorithm 信息隐藏攻击算法
baby-step-giant-step attack algorithm 小步
attack recognition algorithm 攻击识别算法
Algorithm Attack 算法攻击
The concrete step and complexity of the attack algorithm is given.
给出了应用该算法的具体步骤,并分析了攻击算法的计算复杂性。
The new algorithm notably reduces the decoding complexity of the fast correlation attack algorithm.
该算法显著地降低了快速相关攻击算法的译码复杂度。
Testing a bit more than a thousand values against the server may take few minutes, in which the victim session is likely to remain active. This is the outline of an attack algorithm.
对服务器测试几千个以上的值可能要花几分钟,在这段时间受害者就可能仍然活跃。
应用推荐