Login / Signup
Impossible Differential Cryptanalysis on Tweaked E2.
Yuechuan Wei
Xiaoyuan Yang
Chao Li
Weidong Du
Published in:
NSS (2012)
Keyphrases
</>
scatter search
computer vision
hash functions
secret key
databases
case study
data structure
support vector
object recognition
metaheuristic