Login / Signup
Rebound Attacks on SKINNY Hashing with Automatic Tools.
Jian Guo
Shun Li
Guozhen Liu
Phuong Pham
Published in:
IACR Cryptol. ePrint Arch. (2022)
Keyphrases
</>
countermeasures
software tools
fully automatic
social networks
nearest neighbor
denial of service attacks
video copy detection
data mining
malicious attacks
nearest neighbor search
smart card
user friendly
semi automatic
building blocks
digital images
data structure
search engine