Login / Signup
Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash.
Deukjo Hong
Bonwook Koo
Woo-Hwan Kim
Daesung Kwon
Published in:
ICISC (2009)
Keyphrases
</>
malicious attacks
watermarking scheme
computer security
malicious users
data sets
neural network
public key
attack detection
countermeasures
security protocols
cryptographic protocols
security threats
traffic analysis
terrorist attacks