Login / Signup
A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions.
Donghoon Chang
Published in:
IACR Cryptol. ePrint Arch. (2006)
Keyphrases
</>
neural network
similarity measure