Login / Signup

Length Extension Attack on Narrow-Pipe SHA-3 Candidates.

Danilo Gligoroski
Published in: ICT Innovations (2010)
Keyphrases
  • fixed length
  • real time
  • hash functions
  • total length
  • neural network
  • information systems
  • case study
  • preprocessing
  • web applications
  • countermeasures
  • secret key
  • cross section
  • attack detection
  • minimal length