Login / Signup

Boomerang Attack on Step-Reduced SHA-512.

Hongbo YuDongxia Bai
Published in: Inscrypt (2014)
Keyphrases
  • post processing
  • data sets
  • block cipher
  • information retrieval
  • information systems
  • hash functions
  • countermeasures