First Page | Document Content | |
---|---|---|
Date: 2010-04-09 11:04:26SHA-1 Differential cryptanalysis Hash function Rectangular function MD4 Collision resistance Tiger Whirlpool N-Hash Cryptographic hash functions Cryptography Preimage attack | Add to Reading ListSource URL: eprint.iacr.orgDownload Document from Source WebsiteFile Size: 582,60 KBShare Document on Facebook |
Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning Ga¨etan Leurent Inria, France Abstract. In this work we study the security of Chaskey, a recentDocID: 1xTE8 - View Document | |
Chaskey ARX Cryptanalysis Improved Differential-LinearDocID: 1xT7u - View Document | |
Differential Cryptanalysis of the Data Encryption Standard Eli Biham1 Adi Shamir2DocID: 1udaS - View Document | |
Precise Fault-Injections using Voltage and Temperature Manipulation for Differential Cryptanalysis Raghavan Kumar$ , Philipp Jovanovice and Ilia Poliane $ University of Massachusetts, 01002 USADocID: 1tfZi - View Document | |
¨ Bases) Interactions between Computer Algebra (Grobner and Cryptology `DocID: 1qRIx - View Document |