Login / Signup
Pseudo-Cryptanalysis of Luffa.
Keting Jia
Yvo Desmedt
Lidong Han
Xiaoyun Wang
Published in:
Inscrypt (2010)
Keyphrases
</>
secret key
scatter search
real time
learning algorithm
hash functions
neural network
data mining
decision making
digital libraries
wireless sensor networks
management system
response time
simulated annealing
similarity search