Login / Signup
Breaking Cuckoo Hash: Black Box Attacks.
Pedro Reviriego
Daniel Ting
Published in:
IEEE Trans. Dependable Secur. Comput. (2022)
Keyphrases
</>
black box
black boxes
countermeasures
hash functions
white box
integration testing
test cases
watermarking scheme
hybrid systems
rule extraction
data structure
state transition
metadata
security protocols
computational intelligence
relational databases
high level