7 results on '"Rechberger, Christian"'
Search Results
2. The Rebound Attack and Subspace Distinguishers: Application to Whirlpool
3. Rotational Rebound Attacks on Reduced Skein
4. On security arguments of the second round SHA-3 candidates
5. Analysis of the hash function design strategy called SMASH
6. New ASIC/FPGA Cost Estimates for SHA-1 Collisions.
7. Energy evaluation of software implementations of block ciphers under memory constraints.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.