Login / Signup

Preimage attacks on reduced-round Keccak hash functions by solving algebraic systems.

Junling PeiLusheng Chen
Published in: IET Inf. Secur. (2023)
Keyphrases
  • hash functions
  • block cipher
  • management system
  • knn
  • input image
  • multi dimensional
  • countermeasures
  • order preserving