Sign in

Finding Good Differential Patterns for Attacks on SHA-1.

Krystian MatusiewiczJosef Pieprzyk
Published in: WCC (2005)
Keyphrases