Login / Signup
Finding good differential patterns for attacks on SHA-1.
Krystian Matusiewicz
Josef Pieprzyk
Published in:
IACR Cryptol. ePrint Arch. (2004)
Keyphrases
</>
pattern discovery
countermeasures
pattern mining
discovering patterns
database
malicious attacks
discovering interesting
web pages
website
data structure
wireless sensor networks
computer security