Login / Signup
Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256.
Dongxia Bai
Hongbo Yu
Gaoli Wang
Xiaoyun Wang
Published in:
IACR Cryptol. ePrint Arch. (2013)
Keyphrases
</>
countermeasures
real time
data mining
digital images
security protocols
databases
machine learning
image processing
email
multiresolution
significantly reduced
security threats