Sign in

Security Reductions of the Second Round SHA-3 Candidates.

Elena AndreevaBart MenninkBart Preneel
Published in: ISC (2010)
Keyphrases
  • statistical databases
  • database
  • hash functions
  • similarity measure
  • access control
  • anomaly detection
  • information security
  • security analysis
  • security systems
  • information assurance
  • final answer