Login / Signup

Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2.

Ji LiTakanori IsobeKyoji Shibutani
Published in: FSE (2012)
Keyphrases
  • countermeasures
  • key exchange protocol
  • neural network
  • attack detection
  • artificial intelligence
  • computer vision
  • dos attacks
  • cyber attacks
  • power analysis
  • malicious users