Login / Signup
Weak-Diffusion Structure: Meet-in-the-Middle Attacks on Sponge-based Hashing Revisited.
Lingyue Qin
Boxin Zhao
Jialiang Hua
Xiaoyang Dong
Xiaoyun Wang
Published in:
IACR Cryptol. ePrint Arch. (2023)
Keyphrases
</>
countermeasures
neural network
geometric structure
database
data sets
image processing
traffic analysis