Login / Signup
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions.
Bingke Ma
Bao Li
Ronglin Hao
Xiaoqian Li
Published in:
IWSEC (2015)
Keyphrases
</>
block cipher
pattern discovery
image compression
compression scheme
s box
cryptographic algorithms
pattern mining
compression algorithm
data compression
hash functions
watermarking scheme
advanced encryption standard
compression ratio
secret key
image quality