First Page | Document Content | |
---|---|---|
![]() Date: 2010-08-24 17:09:24NIST hash function competition Eli Biham SHA-2 SHA-1 Preimage attack MD5 Advanced Encryption Standard Keccak Collision attack Cryptography Error detection and correction Cryptographic hash functions | Add to Reading List |