First Page | Document Content | |
---|---|---|
Date: 2012-08-14 06:46:39 | Eve’s SHA3 candidate: malicious hashing Jean-Philippe Aumasson∗ Nagravision SA, Switzerland Abstract. We investigate the definition and construction of hash functions that incorporate a backdoor allowing their designAdd to Reading ListSource URL: 131002.netDownload Document from Source WebsiteFile Size: 307,98 KBShare Document on Facebook |