Login / Signup
Practical (Second) Preimage Attacks on TCS_SHA-3.
Gautham Sekar
Soumyadeep Bhattacharya
Published in:
IACR Cryptol. ePrint Arch. (2013)
Keyphrases
</>
real world
data sets
practical application
countermeasures
database
neural network
website
cooperative
average error
terrorist attacks