Login / Signup
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl.
Jian Zou
Wenling Wu
Shuang Wu
Le Dong
Published in:
IACR Cryptol. ePrint Arch. (2012)
Keyphrases
</>
cyber attacks
block cipher
machine learning
lightweight
neural network
data mining
information retrieval
artificial intelligence
hyperplane
fault model
attack detection
security vulnerabilities
key exchange protocol