Login / Signup
How to Backdoor a Cipher.
Raluca Posteuca
Tomer Ashur
Published in:
IACR Cryptol. ePrint Arch. (2021)
Keyphrases
</>
stream cipher
image encryption scheme
ciphertext
image encryption
computer vision
sat instances
block cipher
databases
genetic algorithm
artificial intelligence
information systems
objective function
np hard
advanced encryption standard