Login / Signup
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function.
Jian Zou
Wenling Wu
Shuang Wu
Le Dong
Published in:
J. Inf. Sci. Eng. (2014)
Keyphrases
</>
block cipher
hash functions
secret key
lightweight
hyperplane
chaotic map
hashing algorithm
similarity search
ciphertext
authentication scheme
digital plane
stream cipher