Login / Signup

Revisiting Impossible Differential Cryptanalysis and Expanding the Application of MILP in Impossible Differential Attack.

Weiwei Cao
Published in: ACISP (2) (2024)
Keyphrases
  • real time
  • secret key
  • databases
  • neural network
  • information retrieval
  • website
  • multi objective
  • branch and bound algorithm