Sciweavers

Share
CTRSA   2010 Topics in Cryptology
Wall of Fame | Most Viewed CTRSA-2010 Paper
CTRSA
2010
Springer
257views Cryptology» more  CTRSA 2010»
10 years 9 months ago
Practical Key Recovery Attack against Secret-IV Edon-
Abstract. The SHA-3 competition has been organized by NIST to select a new hashing standard. Edon-R was one of the fastest candidates in the first round of the competition. In thi...
Gaëtan Leurent
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source257
2Download preprint from source232
3Download preprint from source216
4Download preprint from source212
5Download preprint from source211
6Download preprint from source200
7Download preprint from source191
8Download preprint from source189
9Download preprint from source172
10Download preprint from source169
11Download preprint from source152
12Download preprint from source149
13Download preprint from source135
books