Cryptology ePrint Archive: Report 2013/233

Available versions in chronological order


Attacks on JH Hash Function
Yiyuan Luo and Xuejia Lai

Attacks on JH, Grøstl and SMASH Hash Functions
Yiyuan Luo and Xuejia Lai

Attacks on JH, Grøstl and SMASH Hash Functions
Yiyuan Luo and Xuejia Lai

Attacks on JH, Grøstl and SMASH Hash Functions
Yiyuan Luo and Xuejia Lai

Attacks on JH, Grøstl and SMASH Hash Functions
Yiyuan Luo and Xuejia Lai

Attacks on JH, Grøstl and SMASH Hash Functions
Yiyuan Luo and Xuejia Lai

Attacks on JH, Gr{\o}stl and SMASH Hash Functions
Yiyuan Luo and Xuejia Lai


[ Cryptology ePrint archive ]