Login / Signup
New Collision attacks Against Up To 24-step SHA-2.
Somitra Kumar Sanadhya
Palash Sarkar
Published in:
IACR Cryptol. ePrint Arch. (2008)
Keyphrases
</>
countermeasures
post processing
computer systems
hash functions
collision avoidance
collision detection
security threats
traffic analysis
malicious attacks