Login / Signup
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family.
Dmitry Khovratovich
Christian Rechberger
Alexandra Savelieva
Published in:
IACR Cryptol. ePrint Arch. (2011)
Keyphrases
</>
countermeasures
special case
watermarking algorithm
watermarking scheme
chosen plaintext
malicious attacks
neural network
information systems
intrusion detection
security mechanisms
security protocols
java card
security threats
attack detection
malicious users
data corruption