Login / Signup
Security evaluation on Simeck against zero-correlation linear cryptanalysis.
Kai Zhang
Jie Guan
Bin Hu
Dongdai Lin
Published in:
IET Inf. Secur. (2018)
Keyphrases
</>
access control
network security
data sets
security issues
security systems
database
data mining
genetic algorithm
low cost
intrusion detection
linear model
statistical databases
security requirements
computer security
information assurance