Tabu Search Against Permutation Based Stream Ciphers

Encryption is one of the most effective methods of securing data confidentiality, whether stored on hard drives or transferred (e.g. by e-mail or phone call). In this paper a new state recovery attack with tabu search is introduced. Based on research and theoretical approximation it is shown that th...

全面介绍

书目详细资料
Main Authors: Iwona Polak, Marcin Boryczka
格式: 文件
语言:English
出版: Polish Academy of Sciences 2018-05-01
丛编:International Journal of Electronics and Telecommunications
主题:
在线阅读:https://journals.pan.pl/Content/103842/PDF/20_1157-4308-1-PB.pdf