Key-recovery attacks against the MAC algorithm Chaskey.
Chrysanthi MavromatiPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- optimization algorithm
- learning algorithm
- segmentation algorithm
- recognition algorithm
- significant improvement
- dynamic programming
- experimental evaluation
- preprocessing
- cost function
- improved algorithm
- times faster
- tree structure
- high accuracy
- computational cost
- np hard
- theoretical analysis
- data sets
- detection algorithm
- ant colony optimization
- computational complexity
- objective function
- bayesian networks
- watermarking scheme
- recovery algorithm