Cryptology ePrint Archive: Report 2005/193

Available versions in chronological order


An Efficient and Provable Collision Resistant Hash Function
Scott Contini and Arjen K. Lenstra and Ron Steinfeld
Publication Info: none

VSH, an Efficient and Provable Collision Resistant Hash Function
Scott Contini and Arjen K. Lenstra and Ron Steinfeld
Publication Info: submitted to NIST's hash bash

VSH, an Efficient and Provable Collision Resistant Hash Function
Scott Contini and Arjen K. Lenstra and Ron Steinfeld
Publication Info: submitted to NIST's hash bash

VSH, an Efficient and Provable Collision Resistant Hash Function
Scott Contini and Arjen K. Lenstra and Ron Steinfeld
Publication Info: submitted to NIST's hash bash

VSH, an Efficient and Provable Collision Resistant Hash Function
Scott Contini and Arjen K. Lenstra and Ron Steinfeld
Publication Info: submitted to NIST's hash bash

VSH, an Efficient and Provable Collision Resistant Hash Function
Scott Contini and Arjen K. Lenstra and Ron Steinfeld
Publication Info: submitted to NIST's hash bash

VSH, an Efficient and Provable Collision Resistant Hash Function
Scott Contini and Arjen K. Lenstra and Ron Steinfeld
Publication Info: submitted to NIST's hash bash

VSH, an Efficient and Provable Collision Resistant Hash Function
Scott Contini and Arjen K. Lenstra and Ron Steinfeld
Publication Info: submitted to NIST's hash bash

VSH, an Efficient and Provable Collision Resistant Hash Function
Scott Contini and Arjen K. Lenstra and Ron Steinfeld
Publication Info: submitted to NIST's hash bash

VSH, an Efficient and Provable Collision Resistant Hash Function
Scott Contini and Arjen K. Lenstra and Ron Steinfeld
Publication Info: submitted to NIST's hash bash

VSH, an Efficient and Provable Collision Resistant Hash Function
Scott Contini and Arjen K. Lenstra and Ron Steinfeld
Publication Info: submitted to NIST's hash bash

VSH, an Efficient and Provable Collision Resistant Hash Function
Scott Contini and Arjen K. Lenstra and Ron Steinfeld
Publication Info: Eurocrypt 2006


[ Cryptology ePrint archive ]