Cryptology ePrint Archive: Report 2010/381

Available versions in chronological order


Security Reductions of the Second Round SHA-3 Candidates
Elena Andreeva and Bart Mennink and Bart Preneel

Security Reductions of the Second Round SHA-3 Candidates
Elena Andreeva and Bart Mennink and Bart Preneel

Security Reductions of the Second Round SHA-3 Candidates
Elena Andreeva and Bart Mennink and Bart Preneel

Security Reductions of the Second Round SHA-3 Candidates
Elena Andreeva and Bart Mennink and Bart Preneel
Publication Info: To be presented at ISC 2010, this is the full version

Security Reductions of the Second Round SHA-3 Candidates
Elena Andreeva and Bart Mennink and Bart Preneel
Publication Info: Presented at ISC 2010, this is the full version

Security Reductions of the Second Round SHA-3 Candidates
Elena Andreeva and Bart Mennink and Bart Preneel
Publication Info: Presented at ISC 2010, this is the full version

Security Reductions of the Second Round SHA-3 Candidates
Elena Andreeva and Bart Mennink and Bart Preneel
Publication Info: Presented at ISC 2010, this is the full version


[ Cryptology ePrint archive ]