Login / Signup
Preimage Attacks on Round-reduced Keccak-224/256 via an Allocating Approach.
Ting Liu
Yao Sun
Published in:
IACR Cryptol. ePrint Arch. (2019)
Keyphrases
</>
block cipher
resource allocation
watermarking scheme
countermeasures
digital image watermarking
significantly reduced
malicious attacks
neural network
email
traffic analysis
terrorist attacks