Login / Signup
Preimage Attacks on Reduced Tiger and SHA-2.
Takanori Isobe
Kyoji Shibutani
Published in:
FSE (2009)
Keyphrases
</>
countermeasures
neural network
significantly reduced
operating system
database
data sets
genetic algorithm
information systems
smart card
image watermarking
java card
traffic analysis
attack detection
malicious users