Sign in
Security Reductions of the Second Round SHA-3 Candidates.
Elena Andreeva
Bart Mennink
Bart Preneel
Published in:
ISC (2010)
Keyphrases
</>
statistical databases
database
hash functions
similarity measure
access control
anomaly detection
information security
security analysis
security systems
information assurance
final answer