Login / Signup
Cryptanalysis of mCrypton-64.
Mohsen Shakiba
Mohammad Dakhilalian
Hamid Mala
Published in:
Int. J. Commun. Syst. (2015)
Keyphrases
</>
scatter search
secret key
hash functions
s box
high dimensional
block cipher
nearest neighbor
metaheuristic
data management
optimization problems
database
upper bound
lower bound
multiscale
feature extraction
database systems
data sets