Back to Results
First PageMeta Content
Function / Preimage attack / Image / Inverse function / Valuation / GOST / Mathematics / Cryptography / Cryptographic hash functions


Attacks on Hash Functions based on Generalized Feistel Application to Reduced-Round Lesamnta and SHAviteCharles Bouillaguet1 , Orr Dunkelman2 , Ga¨etan Leurent1 , and Pierre-Alain Fouque1 1
Add to Reading List

Document Date: 2010-08-22 12:08:36


Open Document

File Size: 334,61 KB

Share Result on Facebook

City

Paris / /

Company

The AES / /

Country

France / Israel / /

/

Facility

We store / Computer Science Weizmann Institute of Science P.O. Box / /

Organization

Mathematics and Computer Science Weizmann Institute / Faculty of Mathematics / Weizmann Institute of Science / /

Person

SR MC SB SR / /

Product

F18 / F15 / /

ProgrammingLanguage

D / /

Technology

encryption / secret key / /

SocialTag