Login / Signup
The Related-Key Rectangle Attack - Application to SHACAL-1.
Jongsung Kim
Guil Kim
Seokhie Hong
Sangjin Lee
Dowon Hong
Published in:
ACISP (2004)
Keyphrases
</>
decision support
database
data sets
neural network
information retrieval
artificial intelligence
computer vision
three dimensional
hidden markov models
key technologies