Login / Signup
Boomerang Attack on Step-Reduced SHA-512.
Hongbo Yu
Dongxia Bai
Published in:
Inscrypt (2014)
Keyphrases
</>
post processing
data sets
block cipher
information retrieval
information systems
hash functions
countermeasures