Login / Signup
Toward Provable Security Against Differential and Linear Cryptanalysis for Camellia and Related Ciphers.
Liam Keliher
Published in:
Int. J. Netw. Secur. (2007)
Keyphrases
</>
stream cipher
block cipher
network security
information systems
intrusion detection
security issues
computer security
security requirements
security measures
security management
security protocols
linear systems
closed form
secret key
neural network
scatter search
closely related
special case
genetic algorithm