Login / Signup
Preimage attacks on reduced-round Keccak hash functions by solving algebraic systems.
Junling Pei
Lusheng Chen
Published in:
IET Inf. Secur. (2023)
Keyphrases
</>
hash functions
block cipher
management system
knn
input image
multi dimensional
countermeasures
order preserving