Back to Results
First PageMeta Content



Eve’s SHA3 candidate: malicious hashing Jean-Philippe Aumasson∗ Nagravision SA, Switzerland Abstract. We investigate the definition and construction of hash functions that incorporate a backdoor allowing their design
Add to Reading List

Document Date: 2012-08-14 06:46:39


Open Document

File Size: 307,98 KB

Share Result on Facebook