Login / Signup
Collision attack on NaSHA-512.
Ji Li
Liangyu Xu
Xu Guan
Published in:
IACR Cryptol. ePrint Arch. (2008)
Keyphrases
</>
countermeasures
collision detection
collision avoidance
attack detection
data mining
power analysis
attack graphs
real time
databases
information retrieval
decision trees
dynamic environments
authentication protocol
malicious attacks
attack graph