Login / Signup
Cryptanalysis of MD2.
Lars R. Knudsen
John Erik Mathiassen
Frédéric Muller
Søren S. Thomsen
Published in:
J. Cryptol. (2010)
Keyphrases
</>
secret key
hash functions
scatter search
database
data sets
databases
e learning
objective function
information technology
low cost
signature scheme
block cipher