First Page | Document Content | |
---|---|---|
Date: 2008-12-04 03:59:47SHACAL NIST hash function competition Ciphertext SHA-1 Boomerang attack Cryptography Cryptographic hash functions Block cipher | improved_analysis_of_Shamata-BC.dviAdd to Reading ListSource URL: eprint.iacr.orgDownload Document from Source WebsiteFile Size: 77,82 KBShare Document on Facebook |
Amplified Boomerang Attack Against Reduced-Round SHACAL Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, and Seokwon Jung Center for Information Security Technologies(CIST), Korea University, Anam Dong, SDocID: 1jyFw - View Document | |
Security Analysis of PRINCE J´er´emy Jean1? , Ivica Nikoli´c2 , Thomas Peyrin2 , Lei Wang2 and Shuang Wu2 ´ Ecole Normale Sup´erieure, France Division of Mathematical Sciences, School of Physical and Mathematical ScDocID: 18ACY - View Document | |
The 128-bit Blockcipher CLEFIA Security and Performance Evaluations Revision 1.0 June 1, 2007DocID: 17YPu - View Document | |
PDF DocumentDocID: 17pVP - View Document | |
improved_analysis_of_Shamata-BC.dviDocID: 13sov - View Document |