Login / Signup
Attacks On a Double Length Blockcipher-based Hash Proposal.
Yiyuan Luo
Xuejia Lai
Published in:
IACR Cryptol. ePrint Arch. (2011)
Keyphrases
</>
countermeasures
security protocols
b tree
hash functions
watermarking scheme
security threats
traffic analysis
total length
genetic algorithm
high dimensional
web applications
terrorist attacks
data structure
information security
watermarking technique
detect malicious