1![Amplified Boomerang Attack Against Reduced-Round SHACAL Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, and Seokwon Jung Center for Information Security Technologies(CIST), Korea University, Anam Dong, S Amplified Boomerang Attack Against Reduced-Round SHACAL Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, and Seokwon Jung Center for Information Security Technologies(CIST), Korea University, Anam Dong, S](https://www.pdfsearch.io/img/10a2ac3ad2fed88358af08ff3629041e.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2007-08-31 13:50:35
|
---|
2![improved_analysis_of_Shamata-BC.dvi improved_analysis_of_Shamata-BC.dvi](https://www.pdfsearch.io/img/f2f8eaa25c263a2fd5aebc111d9db664.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2008-12-04 03:59:47
|
---|
3![Cryptanalysis of SPEED Chris Hall1 , John Kelsey1 , Vincent Rijmen2 , Bruce Schneier1 , and David Wagner3 1 2 Cryptanalysis of SPEED Chris Hall1 , John Kelsey1 , Vincent Rijmen2 , Bruce Schneier1 , and David Wagner3 1 2](https://www.pdfsearch.io/img/0d25c108034fae805e245f8de2db55d2.jpg) | Add to Reading ListSource URL: www.schneier.comLanguage: English - Date: 2014-03-02 23:18:31
|
---|
4![Some Observations on SHAMATA Ewan Fleischmann and Michael Gorski Bauhaus-University Weimar, Germany {Ewan.Fleischman, Michael.Gorski}@uni-weimar.de Abstract. In this note we discuss some observation of the SHA-3 candida Some Observations on SHAMATA Ewan Fleischmann and Michael Gorski Bauhaus-University Weimar, Germany {Ewan.Fleischman, Michael.Gorski}@uni-weimar.de Abstract. In this note we discuss some observation of the SHA-3 candida](https://www.pdfsearch.io/img/b5ee532386111e247719d61039046da3.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2008-11-27 07:11:39
|
---|
5![KATHOLIEKE UNIVERSITEIT LEUVEN FACULTEIT INGENIEURSWETENSCHAPPEN DEPARTEMENT ELEKTROTECHNIEK–ESAT Kasteelpark Arenberg 10, 3001 Leuven-Heverlee Combined Differential, Linear and Related-Key Attacks KATHOLIEKE UNIVERSITEIT LEUVEN FACULTEIT INGENIEURSWETENSCHAPPEN DEPARTEMENT ELEKTROTECHNIEK–ESAT Kasteelpark Arenberg 10, 3001 Leuven-Heverlee Combined Differential, Linear and Related-Key Attacks](https://www.pdfsearch.io/img/4bc67cb75eaaef343acd35de561ad5c2.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2006-11-28 12:43:02
|
---|
6![Cryptographic Hash Workshop[removed]Some applications of the Biham-Chen attack to SHA-like hash functions Cryptographic Hash Workshop[removed]Some applications of the Biham-Chen attack to SHA-like hash functions](https://www.pdfsearch.io/img/206ba4315f9fb95b9c923ec762d69edc.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-06-20 11:28:42
|
---|
7![Cryptographic Hash Workshop Cryptographic Hash Workshop](https://www.pdfsearch.io/img/3f68818a4665953a168975a9d4d4cf88.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-06-20 08:23:24
|
---|
8![Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA Aleksandar Kircanski 1495E 28th St, 4B, Brooklyn, NY, 11229, US Abstract Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA Aleksandar Kircanski 1495E 28th St, 4B, Brooklyn, NY, 11229, US Abstract](https://www.pdfsearch.io/img/bf7b33a94bbc4522258943ce5503f07f.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2014-07-18 13:28:11
|
---|
9![Design and Analysis of Block Cipher with Variable Word-Size Based on Dedicated Hash Functions: SHACAL-V Yong-Sork HER*, Kouichi SAKURAI Design and Analysis of Block Cipher with Variable Word-Size Based on Dedicated Hash Functions: SHACAL-V Yong-Sork HER*, Kouichi SAKURAI](https://www.pdfsearch.io/img/f6e9e0a7a6c6c0ad46875f81835b86b6.jpg) | Add to Reading ListSource URL: ccc.ustc.edu.cnLanguage: English - Date: 2006-10-24 07:55:02
|
---|
10![Portfolio of recommended cryptographic primitives NESSIE consortium? February 27, 2003 1 Portfolio of recommended cryptographic primitives NESSIE consortium? February 27, 2003 1](https://www.pdfsearch.io/img/c6bc3dbc078ce77c97e29f0faaeda053.jpg) | Add to Reading ListSource URL: www.cosic.esat.kuleuven.beLanguage: English - Date: 2003-02-22 15:34:08
|
---|