Login / Signup
Cryptanalysis of the Toorani-Falahati Hill Ciphers.
Liam Keliher
Anthony Z. Delaney
Published in:
ISCC (2013)
Keyphrases
</>
block cipher
stream cipher
secret key
hash functions
s box
lightweight
hill climbing
scatter search
smart card
data mining
scheduling problem
management system
data sets
genetic algorithm
initial conditions
application layer
databases