Revisit two memoryless state-recovery cryptanalysis methods on A5/1.
Yanbin XuYonglin HaoMingxing WangPublished in: IET Inf. Secur. (2023)
Keyphrases
- significant improvement
- databases
- genetic algorithm
- cross validation
- benchmark datasets
- empirical studies
- preprocessing
- data mining techniques
- methods require
- data sets
- optimization methods
- machine learning methods
- computational cost
- dynamic programming
- evolutionary algorithm
- training data
- database systems
- case study
- information systems
- data mining
- neural network