Login / Signup
Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes.
Zhelei Sun
Peng Wang
Liting Zhang
Published in:
ACISP (2015)
Keyphrases
</>
database
image processing
hash functions
artificial intelligence
search engine
feature selection
decision trees
case study
natural language
special case
statistical analysis
quantitative analysis