Login / Signup
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n.
Mario Lamberger
Florian Mendel
Published in:
ISC (2009)
Keyphrases
</>
countermeasures
structural information
malicious attacks
traffic analysis
information systems
security protocols
neural network
association rules
watermarking scheme
security mechanisms
attack detection