Sign in

New Attacks on Keccak-224 and Keccak-256.

Itai DinurOrr DunkelmanAdi Shamir
Published in: FSE (2012)
Keyphrases
  • malicious attacks
  • countermeasures
  • traffic analysis
  • database
  • genetic algorithm
  • security threats
  • real world
  • information retrieval
  • watermarking scheme