33
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Fast Software Encryption 

      The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl

      other

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references15

          • Record: found
          • Abstract: not found
          • Book Chapter: not found

          How to Break MD5 and Other Hash Functions

            Bookmark
            • Record: found
            • Abstract: not found
            • Book Chapter: not found

            Finding Collisions in the Full SHA-1

              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              The Boomerang Attack

                Bookmark

                Author and book information

                Book Chapter
                2009
                : 260-276
                10.1007/978-3-642-03317-9_16
                1f348f1b-8a2e-49ab-a91d-1175f25f6058
                History

                Comments

                Comment on this book

                Book chapters

                Similar content3,164

                Cited by22