Login / Signup
An Attack on the Last Two Rounds of MD4.
Bert den Boer
Antoon Bosselaers
Published in:
CRYPTO (1991)
Keyphrases
</>
countermeasures
secret key
databases
detection mechanism
database
information retrieval
decision trees
database systems
video sequences
recommender systems
ddos attacks
dos attacks
malicious attacks
malicious users
key exchange protocol