Login / Signup
Preimage Attacks on Step-Reduced MD5.
Yu Sasaki
Kazumaro Aoki
Published in:
ACISP (2008)
Keyphrases
</>
malicious attacks
case study
post processing
database
genetic algorithm
dual space
databases
data mining
multiscale
preprocessing step
countermeasures
security protocols
dos attacks
security threats
malicious users