Login / Signup

Practical Rebound Attack on 12-Round Cheetah-256.

Shuang WuDengguo FengWenling Wu
Published in: ICISC (2009)
Keyphrases
  • real world
  • block cipher
  • decision making
  • information retrieval
  • similarity measure
  • learning environment
  • multi agent systems
  • secret key