Login / Signup
Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512.
Yu Sasaki
Lei Wang
Kazumaro Aoki
Published in:
IACR Cryptol. ePrint Arch. (2009)
Keyphrases
</>
post processing
computer vision
artificial neural networks
preprocessing step
countermeasures
neural network
real world
genetic algorithm
decision trees
cooperative
expert systems