Sign in

New Preimage Attacks against Reduced SHA-1.

Simon KnellwolfDmitry Khovratovich
Published in: CRYPTO (2012)
Keyphrases
  • countermeasures
  • real time
  • malicious attacks
  • traffic analysis
  • social networks
  • hash functions
  • computer security
  • security protocols
  • security threats
  • denial of service attacks
  • malicious users