Login / Signup
Counter-Cryptanalysis.
Marc Stevens
Published in:
CRYPTO (1) (2013)
Keyphrases
</>
hash functions
secret key
scatter search
real time
databases
neural network
computational complexity
input image
genetic programming
computer systems