Sciweavers

6 search results - page 2 / 2
» Preimages for Step-Reduced SHA-2
Sort
View
ISW
2009
Springer
14 years 3 days ago
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n
The recently started SHA-3 competition in order to find a new secure hash standard and thus a replacement for SHA-1/SHA-2 has attracted a lot of interest in the academic world as ...
Mario Lamberger, Florian Mendel