Login / Signup
Exploiting Coding Theory for Collision Attacks on SHA-1.
Norbert Pramstaller
Christian Rechberger
Vincent Rijmen
Published in:
IMACC (2005)
Keyphrases
</>
neural network
collision avoidance
collision detection
countermeasures
security threats
database
signal processing
image watermarking
traffic analysis
security mechanisms
computer security
security protocols
digital watermarking
malicious attacks