Sign in

Key recovery attack for PRESENT using slender-set linear cryptanalysis.

Guoqiang LiuChenhui JinZhiyin Kong
Published in: Sci. China Inf. Sci. (2016)
Keyphrases
  • databases
  • data mining
  • genetic algorithm
  • artificial intelligence
  • case study
  • similarity measure
  • video sequences
  • feature space
  • small number
  • user defined
  • secret key
  • block cipher