ICISC   2007 International Conference on Information Security and Cryptology
Wall of Fame | Most Viewed ICISC-2007 Paper
152views Cryptology» more  ICISC 2007»
13 years 6 months ago
Analysis of Multivariate Hash Functions
We analyse the security of new hash functions whose compression function is explicitly defined as a sequence of multivariate equations. First we prove non-universality of certain ...
Jean-Philippe Aumasson, Willi Meier
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source152
2Download preprint from source134
3Download preprint from source125
4Download preprint from source120
5Download preprint from source120
6Download preprint from source117
7Download preprint from source105
8Download preprint from source102
9Download preprint from source100
10Download preprint from source99
11Download preprint from source97
12Download preprint from source96
13Download preprint from source95
14Download preprint from source77
15Download preprint from source75