Cryptology ePrint Archive: Report 2013/150
Available versions in chronological order
20130315:043423 (posted 15-Mar-2013 04:34:23 UTC)
Practical (Second) Preimage Attacks on TCS_SHA-3
Gautham Sekar and Soumyadeep Bhattacharya
20130315:110604 (posted 15-Mar-2013 11:06:04 UTC)
Practical (Second) Preimage Attacks on TCS_SHA-3
Gautham Sekar and Soumyadeep Bhattacharya
20130820:114308 (posted 20-Aug-2013 11:43:08 UTC)
Practical (Second) Preimage Attacks on TCS_SHA-3
Gautham Sekar and Soumyadeep Bhattacharya
20131021:114120 (posted 21-Oct-2013 11:41:20 UTC)
Practical (Second) Preimage Attacks on TCS_SHA-3
Gautham Sekar and Soumyadeep Bhattacharya
20131022:114808 (posted 22-Oct-2013 11:48:08 UTC)
Practical (Second) Preimage Attacks on TCS_SHA-3
Gautham Sekar and Soumyadeep Bhattacharya
[
Cryptology ePrint archive
]