![NIST hash function competition / Edon / Ohio / Espionage / Cyberwarfare / Security / Cryptographic hash functions / Cryptography / Preimage attack NIST hash function competition / Edon / Ohio / Espionage / Cyberwarfare / Security / Cryptographic hash functions / Cryptography / Preimage attack](https://www.pdfsearch.io/img/bb3c1b603dfeaef5e3efb6b40fec5526.jpg)
| Document Date: 2012-06-07 13:45:08 Open Document File Size: 490,93 KBShare Result on Facebook
Company Intel / Ivica Nikolic Laboratory / / / Facility University of Luxembourg / Ivica Nikolic Laboratory of Algorithms / / IndustryTerm e-print / Parallel collision search / memoryless algorithm / cryptanalytic applications / / Organization University of Luxembourg / U.S. Securities and Exchange Commission / / Person Ivica Nikoli / Danilo Gligoroski / Ivica Nikolic / Ralph-Philipp Weinmann / Michael J.Wiener / Paul C. Van Oorschot / Dmitry Khovratovich / / / Position AM OFFICIAL / / PublishedMedium Journal of Cryptology / / Technology Cryptography / memoryless algorithm / secret key / Software Encryption / / URL http /
SocialTag |