First Page | Document Content | |
---|---|---|
Date: 2013-06-08 07:57:19SHA-1 MD5 Collision attack MD4 SHA-2 Cryptanalysis Padding Crypt Tiger Cryptography Cryptographic hash functions Hashing | Counter-cryptanalysis Marc Stevens CWI, Amsterdam, The NetherlandsAdd to Reading ListSource URL: marc-stevens.nlDownload Document from Source WebsiteFile Size: 603,92 KBShare Document on Facebook |