Login / Signup
Related-Key Attacks on Reduced Rounds of SHACAL-2.
Jongsung Kim
Guil Kim
Sangjin Lee
Jongin Lim
Jung Hwan Song
Published in:
INDOCRYPT (2004)
Keyphrases
</>
machine learning
malicious attacks
neural network
computer security
database
genetic algorithm
knowledge base
multiscale
watermarking scheme
security mechanisms