Login / Signup
Preimage Attack on ARIRANG.
Deukjo Hong
Woo-Hwan Kim
Bonwook Koo
Published in:
IACR Cryptol. ePrint Arch. (2009)
Keyphrases
</>
countermeasures
neural network
genetic algorithm
hyperplane
detection mechanism
malicious attacks
dual space
information retrieval
e learning
case study
high dimensional
secret key
power analysis
data corruption