Login / Signup

Differential cryptanalysis of WARP.

Je Sen TehAlex Biryukov
Published in: J. Inf. Secur. Appl. (2022)
Keyphrases
  • scatter search
  • case study
  • hash functions
  • data sets
  • artificial neural networks
  • evolutionary algorithm
  • s box