Login / Signup
Impossible differential cryptanalysis on cipher E2.
Yuechuan Wei
Xiaoyuan Yang
Chao Li
Published in:
Concurr. Comput. Pract. Exp. (2014)
Keyphrases
</>
block cipher
s box
hash functions
scatter search
ciphertext
secret key
data mining
image encryption
encryption algorithm
lightweight
objective function
neural network
application layer
image compression
database systems
information systems
stream cipher