Cryptology ePrint Archive: Report 2013/233
Available versions in chronological order
20130429:111901 (posted 29-Apr-2013 11:19:01 UTC)
Attacks on JH Hash Function
Yiyuan Luo and Xuejia Lai
20130429:125241 (posted 29-Apr-2013 12:52:41 UTC)
Attacks on JH, Grøstl and SMASH Hash Functions
Yiyuan Luo and Xuejia Lai
20130429:125332 (posted 29-Apr-2013 12:53:32 UTC)
Attacks on JH, Grøstl and SMASH Hash Functions
Yiyuan Luo and Xuejia Lai
20130501:021931 (posted 01-May-2013 02:19:31 UTC)
Attacks on JH, Grøstl and SMASH Hash Functions
Yiyuan Luo and Xuejia Lai
20130503:084340 (posted 03-May-2013 08:43:40 UTC)
Attacks on JH, Grøstl and SMASH Hash Functions
Yiyuan Luo and Xuejia Lai
20130503:084507 (posted 03-May-2013 08:45:07 UTC)
Attacks on JH, Grøstl and SMASH Hash Functions
Yiyuan Luo and Xuejia Lai
20131012:123447 (posted 12-Oct-2013 12:34:47 UTC)
Attacks on JH, Gr{\o}stl and SMASH Hash Functions
Yiyuan Luo and Xuejia Lai
[
Cryptology ePrint archive
]