Login / Signup
The Boomerang Attacks on BLAKE and BLAKE2.
Yonglin Hao
Published in:
IACR Cryptol. ePrint Arch. (2014)
Keyphrases
</>
countermeasures
social networks
database
neural network
real world
data mining
information retrieval
case study
multiscale
cooperative
multiresolution
security mechanisms
security threats
malicious users