Login / Signup
Practical Attacks on NESHA-256.
Orr Dunkelman
Tor E. Bjørstad
Published in:
IACR Cryptol. ePrint Arch. (2009)
Keyphrases
</>
real time
neural network
real world
information systems
countermeasures
databases
search engine
website
video sequences
practical application
malicious attacks