Login / Signup
Length Extension Attack on Narrow-Pipe SHA-3 Candidates.
Danilo Gligoroski
Published in:
ICT Innovations (2010)
Keyphrases
</>
fixed length
real time
hash functions
total length
neural network
information systems
case study
preprocessing
web applications
countermeasures
secret key
cross section
attack detection
minimal length