Back to Results
First PageMeta Content
Boomerang attack / SHA-1 / Blake / Differential cryptanalysis / SHA-2 / Boomerang / MD5 / Differential equation / Error detection and correction / Cryptography / Cryptographic hash functions


The Boomerang Attacks on BLAKE and BLAKE2 Yonglin Hao Department of Computer Science and Technology, Tsinghua Universtiy, Beijing, China Abstract. In this paper, we study the securit
Add to Reading List

Document Date: 2014-12-18 20:17:27


Open Document

File Size: 365,76 KB

Share Result on Facebook

City

Beijing / /

Country

China / /

Currency

pence / /

/

IndustryTerm

secure systems / computing / /

Organization

BLAKE / Type I. Organization of the Paper / National Natural Science Foundation of China / BLAKE and BLAKE2 / BLAKE2 Yonglin Hao Department of Computer Science and Technology / G7 / /

/

PublishedMedium

Cryptology ePrint Archive / /

Technology

Cryptography / aV / Software Encryption / /

URL

http /

SocialTag