First Page | Document Content | |
---|---|---|
![]() Date: 2008-12-04 03:59:47SHACAL NIST hash function competition Ciphertext SHA-1 Boomerang attack Cryptography Cryptographic hash functions Block cipher | Add to Reading List |
![]() | Amplified Boomerang Attack Against Reduced-Round SHACAL Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, and Seokwon Jung Center for Information Security Technologies(CIST), Korea University, Anam Dong, SDocID: 1jyFw - View Document |
![]() | Security Analysis of PRINCE J´er´emy Jean1? , Ivica Nikoli´c2 , Thomas Peyrin2 , Lei Wang2 and Shuang Wu2 ´ Ecole Normale Sup´erieure, France Division of Mathematical Sciences, School of Physical and Mathematical ScDocID: 18ACY - View Document |
![]() | The 128-bit Blockcipher CLEFIA Security and Performance Evaluations Revision 1.0 June 1, 2007DocID: 17YPu - View Document |
![]() | PDF DocumentDocID: 17pVP - View Document |
![]() | improved_analysis_of_Shamata-BC.dviDocID: 13sov - View Document |