Login / Signup
Self-Differential Cryptanalysis of Up to 5 Rounds of SHA-3.
Itai Dinur
Orr Dunkelman
Adi Shamir
Published in:
IACR Cryptol. ePrint Arch. (2012)
Keyphrases
</>
hash functions
secret key
similarity search
data distribution
data sets
data mining
machine learning
genetic algorithm
computer vision
feature extraction
pattern recognition
data analysis
signature scheme
block cipher