Login / Signup
Impossible differential cryptanalysis of FBC-128.
Yi Zhang
Guoqiang Liu
Chao Li
Xuan Shen
Published in:
J. Inf. Secur. Appl. (2022)
Keyphrases
</>
secret key
scatter search
data analysis
wireless sensor networks
genetic algorithm
computer vision
hidden markov models
hash functions