Login / Signup

Cryptanalysis of Helix and Phelix Revisited.

Zhenqing ShiBin ZhangDengguo Feng
Published in: ACISP (2013)
Keyphrases
  • scatter search
  • hash functions
  • real time
  • neural network
  • signature scheme
  • block cipher
  • databases
  • machine learning
  • image processing
  • face recognition
  • digital libraries
  • cost function