Login / Signup
Differential and Rectangle Attacks on Reduced-Round SHACAL-1.
Jiqiang Lu
Jongsung Kim
Nathan Keller
Orr Dunkelman
Published in:
INDOCRYPT (2006)
Keyphrases
</>
hough transform
block cipher
axis parallel
traffic analysis
real time
countermeasures
malicious attacks
chosen plaintext
data mining
image processing
case study
significantly reduced
image watermarking
malicious users