Login / Signup

Preimage Attacks on Step-Reduced MD5.

Yu SasakiKazumaro Aoki
Published in: ACISP (2008)
Keyphrases
  • malicious attacks
  • case study
  • post processing
  • database
  • genetic algorithm
  • dual space
  • databases
  • data mining
  • multiscale
  • preprocessing step
  • countermeasures
  • security protocols
  • dos attacks
  • security threats
  • malicious users