Toggle navigation
PDFSEARCH.IO
Document Search Engine - browse more than 18 million documents
Sign up
Sign in
Back to Results
First Page
Meta Content
View Document Preview and Link
The Boomerang Attacks on BLAKE and BLAKE2 Yonglin Hao Department of Computer Science and Technology, Tsinghua Universtiy, Beijing, China Abstract. In this paper, we study the securit
Add to Reading List
Document Date: 2014-12-18 20:17:27
Open Document
File Size: 365,76 KB
Share Result on Facebook
City
Beijing /
/
Country
China /
/
Currency
pence /
/
/
IndustryTerm
secure systems /
computing /
/
Organization
BLAKE /
Type I. Organization of the Paper /
National Natural Science Foundation of China /
BLAKE and BLAKE2 /
BLAKE2 Yonglin Hao Department of Computer Science and Technology /
G7 /
/
/
PublishedMedium
Cryptology ePrint Archive /
/
Technology
Cryptography /
aV /
Software Encryption /
/
URL
http /
SocialTag
Boomerang attack
SHA-1
Blake
Differential cryptanalysis
SHA-2
Boomerang
MD5
Differential equation
Error detection and correction
Cryptography