Login / Signup
Practical Rebound Attack on 12-Round Cheetah-256.
Shuang Wu
Dengguo Feng
Wenling Wu
Published in:
ICISC (2009)
Keyphrases
</>
real world
block cipher
decision making
information retrieval
similarity measure
learning environment
multi agent systems
secret key