Languages: English | Français
Process of establishing the exploitability of a cryptographic system, normally by reviewing transmitted traffic protected or secured by the system under study.
Source: CNSSI 4009-2015 | Category: