Login / Signup

Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n.

Mario LambergerFlorian Mendel
Published in: ISC (2009)
Keyphrases
  • countermeasures
  • structural information
  • malicious attacks
  • traffic analysis
  • information systems
  • security protocols
  • neural network
  • association rules
  • watermarking scheme
  • security mechanisms
  • attack detection