README (279B)
1 linear cryptanalysis 2 3 an implementation of a simple linear cryptanalysis attack on a substitution- 4 permutation network. the exact network is as described in [1]. 5 6 [1] - Douglas Stinson. 2002. Cryptography: Theory and Practice, Second Edition 7 (2nd. ed.). CRC/C&H.