Selected Areas in Cryptography
From MaRDI portal
Publication:5713956
DOI10.1007/B96837zbMath1081.94524OpenAlexW2501607630MaRDI QIDQ5713956
Henri Gilbert, Helena Handschuh
Publication date: 27 December 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b96837
Related Items (11)
Secure data storage in cloud: an e-stream cipher-based secure and dynamic updation policy ⋮ A structure-based chaotic hashing scheme ⋮ Attacking Reduced Round SHA-256 ⋮ Astrolabous: a universally composable time-lock encryption scheme ⋮ Non-linear Reduced Round Attacks against SHA-2 Hash Family ⋮ Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family ⋮ Analysing the HPKE standard ⋮ Collisions and Other Non-random Properties for Step-Reduced SHA-256 ⋮ A combinatorial analysis of recent attacks on step reduced SHA-2 family ⋮ Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256 ⋮ New Collision Attacks against Up to 24-Step SHA-2
This page was built for publication: Selected Areas in Cryptography