Security reductions of the second round SHA-3 candidates

From MaRDI portal
Publication:3073779

DOI10.1007/978-3-642-18178-8_5zbMATH Open1371.94619OpenAlexW2058940365MaRDI QIDQ3073779FDOQ3073779


Authors: E. A. Andreeva, Bart Mennink, Bart Preneel Edit this on Wikidata


Publication date: 11 February 2011

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-18178-8_5




Recommendations





Cited In (12)





This page was built for publication: Security reductions of the second round SHA-3 candidates

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3073779)