Login / Signup
Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2.
Ji Li
Takanori Isobe
Kyoji Shibutani
Published in:
FSE (2012)
Keyphrases
</>
countermeasures
key exchange protocol
neural network
attack detection
artificial intelligence
computer vision
dos attacks
cyber attacks
power analysis
malicious users