Login / Signup
Cryptanalysis of GOST2.
Tomer Ashur
Achiya Bar-On
Orr Dunkelman
Published in:
IACR Trans. Symmetric Cryptol. (2017)
Keyphrases
</>
scatter search
secret key
hash functions
block cipher
neural network
evolutionary algorithm
s box
database
sufficient conditions
metaheuristic
signature scheme