Login / Signup

Impossible Differential Cryptanalysis on Tweaked E2.

Yuechuan WeiXiaoyuan YangChao LiWeidong Du
Published in: NSS (2012)
Keyphrases
  • scatter search
  • computer vision
  • hash functions
  • secret key
  • databases
  • case study
  • data structure
  • support vector
  • object recognition
  • metaheuristic