Weaknesses in the SL2(IFs2) Hashing Scheme
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
The State of Cryptographic Hash Functions
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Cryptographic Primitives for Information Authentication - State of the Art
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
On the Security of the Hashing Scheme Based on SL2
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Collisions for the LPS expander graph hash function
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
Crypto topics and applications I
Algorithms and theory of computation handbook
Preimages for the Tillich-Zémor hash function
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Hi-index | 0.02 |