Skip to main content
. 2022 Sep 27;22(19):7332. doi: 10.3390/s22197332

Figure 11.

Figure 11

Size of Key Space to be searched for Brute Force Attacks for different values of M and N.