Sciweavers

Share
ISW
2010
Springer

Security Reductions of the Second Round SHA-3 Candidates

8 years 8 months ago
Security Reductions of the Second Round SHA-3 Candidates
In 2007, the US National Institute for Standards and Technology announced a call for the design of a new cryptographic hash algorithm in response to vulnerabilities identified in existing hash
Elena Andreeva, Bart Mennink, Bart Preneel
Added 13 Feb 2011
Updated 13 Feb 2011
Type Journal
Year 2010
Where ISW
Authors Elena Andreeva, Bart Mennink, Bart Preneel
Comments (0)
books