Login / Signup
Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVAL.
Yu Sasaki
Wataru Komatsubara
Yasuhide Sakai
Lei Wang
Mitsugu Iwamoto
Kazuo Sakiyama
Kazuo Ohta
Published in:
SECRYPT (2013)
Keyphrases
</>
hyperplane
countermeasures
malicious users
security mechanisms
traffic analysis
detect malicious
real time
dual space
dos attacks
neural network
java card
security risks
denial of service attacks
malicious attacks
terrorist attacks
attack detection
computer security
social networks