Login / Signup

The Related-Key Rectangle Attack - Application to SHACAL-1.

Jongsung KimGuil KimSeokhie HongSangjin LeeDowon Hong
Published in: ACISP (2004)
Keyphrases
  • decision support
  • database
  • data sets
  • neural network
  • information retrieval
  • artificial intelligence
  • computer vision
  • three dimensional
  • hidden markov models
  • key technologies