Cryptology ePrint Archive: Report 2009/292

Available versions in chronological order


Implementing Wagner's generalized birthday attack against the SHA-3 candidate FSB
Daniel J. Bernstein and Tanja Lange and Christiane Peters and Ruben Niederhagen and Peter Schwabe

Implementing Wagner's generalized birthday attack against the SHA-3 candidate FSB
Daniel J. Bernstein and Tanja Lange and Christiane Peters and Ruben Niederhagen and Peter Schwabe

Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB
Daniel J. Bernstein and Tanja Lange and Christiane Peters and Ruben Niederhagen and Peter Schwabe

Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB
Daniel J. Bernstein and Tanja Lange and Christiane Peters and Ruben Niederhagen and Peter Schwabe

Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB
Daniel J. Bernstein and Tanja Lange and Christiane Peters and Ruben Niederhagen and Peter Schwabe

Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB
Daniel J. Bernstein and Tanja Lange and Christiane Peters and Ruben Niederhagen and Peter Schwabe

Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB
Daniel J. Bernstein and Tanja Lange and Christiane Peters and Ruben Niederhagen and Peter Schwabe

Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB
Daniel J. Bernstein and Tanja Lange and Ruben Niederhagen and Christiane Peters and Peter Schwabe

Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB
Daniel J. Bernstein and Tanja Lange and Ruben Niederhagen and Christiane Peters and Peter Schwabe


[ Cryptology ePrint archive ]