From post

Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks Against 6-Round SHA-3.

, , , и . ASIACRYPT (3), том 13793 из Lecture Notes in Computer Science, стр. 645-674. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Credit Card Fraud Detection Using Convolutional Neural Networks., , , и . ICONIP (3), том 9949 из Lecture Notes in Computer Science, стр. 483-490. (2016)Comparative Study of the Thermal and Hydraulic Performance of Supercritical CO2 and Water in Microchannels Based on Entropy Generation., и . Entropy, 24 (9): 1312 (2022)A Dynamic Default Prediction Framework for Networked-guarantee Loans., , , , , и . CIKM, стр. 2547-2555. ACM, (2019)Deep Learning Assisted Key Recovery Attack for Round-Reduced Simeck32/64., , и . ISC, том 13640 из Lecture Notes in Computer Science, стр. 443-463. Springer, (2022)Learning From Web Data With Self-Organizing Memory Module., , , , и . CVPR, стр. 12843-12852. Computer Vision Foundation / IEEE, (2020)Improving the Deep-Learning-Based Differential Distinguisher and Applications to Simeck., , и . CSCWD, стр. 465-470. IEEE, (2022)Image Cropping with Composition and Saliency Aware Aesthetic Score Map., , , , и . AAAI, стр. 12104-12111. AAAI Press, (2020)LayoutMask: Enhance Text-Layout Interaction in Multi-modal Pre-training for Document Understanding., , , и . ACL (1), стр. 15200-15212. Association for Computational Linguistics, (2023)Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks Against 6-Round SHA-3., , , и . ASIACRYPT (3), том 13793 из Lecture Notes in Computer Science, стр. 645-674. Springer, (2022)Risk Assessment for Networked-guarantee Loans Using High-order Graph Attention Representation., , , , и . IJCAI, стр. 5822-5828. ijcai.org, (2019)