Login / Signup
On Immunity Against Biham and Shamir's "Differential Cryptanalysis".
Carlisle M. Adams
Published in:
Inf. Process. Lett. (1992)
Keyphrases
</>
secret key
secret sharing scheme
public key
key management
hash functions
multi objective optimization
smart card
multiresolution
block cipher
scatter search
data sets
evolutionary algorithm
high dimensional
digital libraries
database systems
decision trees
artificial intelligence
neural network
databases