Login / Signup
New Attacks on Keccak-224 and Keccak-256.
Itai Dinur
Orr Dunkelman
Adi Shamir
Published in:
FSE (2012)
Keyphrases
</>
malicious attacks
countermeasures
traffic analysis
database
genetic algorithm
security threats
real world
information retrieval
watermarking scheme