Login / Signup

Differential Cryptanalysis of SipHash.

Christoph DobraunigFlorian MendelMartin Schläffer
Published in: Selected Areas in Cryptography (2014)
Keyphrases
  • hash functions
  • secret key
  • pattern recognition
  • scatter search
  • data sets
  • neural network
  • data mining
  • training set
  • scheduling problem
  • low cost
  • computer simulation