Extracts from the SHA-3 Competition
From MaRDI portal
Publication:3455489
DOI10.1007/978-3-642-35999-6_6zbMath1327.94070OpenAlexW1417050938MaRDI QIDQ3455489
Publication date: 4 December 2015
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-35999-6_6
Uses Software
Cites Work
- Advances in cryptology -- EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22--26, 2005. Proceedings
- Cryptanalysis of MD4
- Advances in cryptology -- CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14--18, 2005. Proceedings
- Careful with Composition: Limitations of the Indifferentiability Framework
- Security Reductions of the Second Round SHA-3 Candidates
- Biclique Cryptanalysis of the Full AES
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
This page was built for publication: Extracts from the SHA-3 Competition