Login / Signup
Cryptanalysis of Koyama Scheme.
Sahadeo Padhye
Published in:
Int. J. Netw. Secur. (2006)
Keyphrases
</>
hash functions
databases
classification scheme
detection scheme
real time
neural network
lower bound
learning scheme
polynomial time approximation