<--- Back to Details
First PageDocument Content
Date: 2012-08-14 06:46:39

Eve’s SHA3 candidate: malicious hashing Jean-Philippe Aumasson∗ Nagravision SA, Switzerland Abstract. We investigate the definition and construction of hash functions that incorporate a backdoor allowing their design

Add to Reading List

Source URL: 131002.net

Download Document from Source Website

File Size: 307,98 KB

Share Document on Facebook

Similar Documents