First Page | Document Content | |
---|---|---|
Date: 2012-06-20 08:23:24Eli Biham NESSIE Symmetric-key algorithm Serpent Cryptographic hash function Boomerang attack Advanced Encryption Standard Cryptanalysis KASUMI Cryptography Block ciphers SHACAL | Cryptographic Hash WorkshopAdd to Reading ListSource URL: csrc.nist.govDownload Document from Source WebsiteFile Size: 19,92 KBShare Document on Facebook |