"Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash ..."

Lei Wang et al. (2012)

Details and statistics

DOI: 10.1587/TRANSFUN.E95.A.100

access: closed

type: Journal Article

metadata version: 2020-04-11

a service of  Schloss Dagstuhl - Leibniz Center for Informatics