Results 181 to 185 of about 4,088 (185)
Some of the next articles are maybe not open access.

Preimage and Second-Preimage Attacks on PGV Hashing Modes of Round-Reduced ARIA, Camellia, and Serpent

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2012
Deukjo HONG, Bonwook KOO, Dong-Chan KIM
openaire   +1 more source

Preimage attack on step reduced hash function HAVAL

Journal of Computer Applications, 2009
openaire   +1 more source

Home - About - Disclaimer - Privacy