Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
Free Online Productivity Tools
i2Speak
i2Symbol
i2OCR
iTex2Img
iWeb2Print
iWeb2Shot
i2Type
iPdf2Split
iPdf2Merge
i2Bopomofo
i2Arabic
i2Style
i2Image
i2PDF
iLatex2Rtf
Sci2ools
134
Voted
ISW
2010
Springer
134
views
Information Technology
»
more
ISW 2010
»
Security Reductions of the Second Round SHA-3 Candidates
15 years 20 days ago
Download
eprint.iacr.org
In 2007, the US National Institute for Standards and Technology announced a call for the design of a new cryptographic hash algorithm in response to vulnerabilities identified in existing hash
Elena Andreeva, Bart Mennink, Bart Preneel
Real-time Traffic
Cryptographic Hash Algorithm
|
Information Technology
|
ISW 2010
|
National Institute
|
Vulnerabilities
|
claim paper
Related Content
»
FPGA Implementations of the Round Two SHA3 Candidates
»
Structural Attacks on Two SHA3 Candidates Blendern and DCHn
»
Cryptanalysis of the Compression Function of SIMD
»
Really Fast SyndromeBased Hashing
»
Pseudocryptanalysis of the Original Blue Midnight Wish
»
Second Preimage Attack on SHAMATA512
»
Distinguishers for the Compression Function and Output Transformation of Hamsi256
»
NearCollisions on the ReducedRound Compression Functions of Skein and BLAKE
»
Practical Pseudocollisions for Hash Functions ARIRANG224384
more »
Post Info
More Details (n/a)
Added
13 Feb 2011
Updated
13 Feb 2011
Type
Journal
Year
2010
Where
ISW
Authors
Elena Andreeva, Bart Mennink, Bart Preneel
Comments
(0)
Researcher Info
Information Technology Study Group
Computer Vision