Login / Signup
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys.
Eli Biham
Yaniv Carmeli
Itai Dinur
Orr Dunkelman
Nathan Keller
Adi Shamir
Published in:
IACR Cryptol. ePrint Arch. (2013)
Keyphrases
</>
secret key
hash functions
key agreement
provably secure
signature scheme
neural network
scatter search
database schemes
data sets
feature selection