Login / Signup
Cryptanalysis of Helix and Phelix Revisited.
Zhenqing Shi
Bin Zhang
Dengguo Feng
Published in:
ACISP (2013)
Keyphrases
</>
scatter search
hash functions
real time
neural network
signature scheme
block cipher
databases
machine learning
image processing
face recognition
digital libraries
cost function