Login / Signup
Preimage Attacks on Some Hashing Modes Instantiating Reduced-Round LBlock.
Shiwei Chen
Chenhui Jin
Published in:
IEEE Access (2018)
Keyphrases
</>
block cipher
hash functions
data structure
traffic analysis
countermeasures
watermarking algorithm
chosen plaintext
data sets
similarity search
hash tables
neural network
hamming distance
nearest neighbor search
attack detection
malicious users