Login / Signup
On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis.
Bo-Yin Yang
Jiun-Ming Chen
Nicolas T. Courtois
Published in:
ICICS (2004)
Keyphrases
</>
objective function
network security
intrusion detection
security policies
information security
optimization problems
computer security
numerically stable
neural network
data mining
simulated annealing
security level
numerical stability