Login / Signup
Cryptanalysis of GOST2.
Tomer Ashur
Achiya Bar-On
Orr Dunkelman
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
secret key
hash functions
scatter search
block cipher
signature scheme
efficient implementation
databases
neural network
management system
low cost
metaheuristic
tabu search