Login / Signup
Key recovery attack for PRESENT using slender-set linear cryptanalysis.
Guoqiang Liu
Chenhui Jin
Zhiyin Kong
Published in:
Sci. China Inf. Sci. (2016)
Keyphrases
</>
databases
data mining
genetic algorithm
artificial intelligence
case study
similarity measure
video sequences
feature space
small number
user defined
secret key
block cipher