equivalent key attack algorithm 等效密钥攻击算法
Information Hiding Attack Algorithm 信息隐藏攻击算法
baby-step-giant-step attack algorithm 小步
attack recognition algorithm 攻击识别算法
Algorithm Attack 算法攻击
The concrete step and complexity of the attack algorithm is given.
给出了应用该算法的具体步骤,并分析了攻击算法的计算复杂性。
In the end of the paper, an attack example of the difference attack algorithm was supplied.
利用该算法,最后给出了攻击实例。
The new algorithm notably reduces the decoding complexity of the fast correlation attack algorithm.
该算法显著地降低了快速相关攻击算法的译码复杂度。
应用推荐