Cryptology ePrint Archive: Report 2010/381
Available versions in chronological order
20100707:012529 (posted 07-Jul-2010 01:25:29 UTC)
Security Reductions of the Second Round SHA-3 Candidates
Elena Andreeva and Bart Mennink and Bart Preneel
20100707:124650 (posted 07-Jul-2010 12:46:50 UTC)
Security Reductions of the Second Round SHA-3 Candidates
Elena Andreeva and Bart Mennink and Bart Preneel
20100730:102611 (posted 30-Jul-2010 10:26:11 UTC)
Security Reductions of the Second Round SHA-3 Candidates
Elena Andreeva and Bart Mennink and Bart Preneel
20101001:112811 (posted 01-Oct-2010 11:28:11 UTC)
Security Reductions of the Second Round SHA-3 Candidates
Elena Andreeva and Bart Mennink and Bart Preneel
Publication Info: To be presented at ISC 2010, this is the full version
20101108:091449 (posted 08-Nov-2010 09:14:49 UTC)
Security Reductions of the Second Round SHA-3 Candidates
Elena Andreeva and Bart Mennink and Bart Preneel
Publication Info: Presented at ISC 2010, this is the full version
20110315:152623 (posted 15-Mar-2011 15:26:23 UTC)
Security Reductions of the Second Round SHA-3 Candidates
Elena Andreeva and Bart Mennink and Bart Preneel
Publication Info: Presented at ISC 2010, this is the full version
20110826:123912 (posted 26-Aug-2011 12:39:12 UTC)
Security Reductions of the Second Round SHA-3 Candidates
Elena Andreeva and Bart Mennink and Bart Preneel
Publication Info: Presented at ISC 2010, this is the full version
[
Cryptology ePrint archive
]