Login / Signup
Finding Good Differential Patterns for Attacks on SHA-1.
Krystian Matusiewicz
Josef Pieprzyk
Published in:
WCC (2005)
Keyphrases
</>
countermeasures
pattern discovery
data mining techniques
pattern mining
watermarking scheme
traffic analysis
real time
genetic algorithm
frequent patterns
design patterns
discovering interesting
discovering patterns