Login / Signup
Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks.
Xiaoyang Dong
Jialiang Hua
Siwei Sun
Zheng Li
Xiaoyun Wang
Lei Hu
Published in:
CRYPTO (3) (2021)
Keyphrases
</>
countermeasures
data sets
neural network
security threats
malicious attacks
watermarking scheme
terrorist attacks
malicious users
data corruption
lightweight
computer security
security risks
attack detection
digital image watermarking
chosen plaintext