Login / Signup
New attacks on Keccak-224 and Keccak-256.
Itai Dinur
Orr Dunkelman
Adi Shamir
Published in:
IACR Cryptol. ePrint Arch. (2011)
Keyphrases
</>
countermeasures
database
databases
cooperative
data sets
artificial intelligence
security threats
malicious attacks
security flaws