Amanote Research

Amanote Research

    RegisterSign In

Improved Rebound Attack on the Finalist Grøstl

Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-642-34047-5_7
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer ScienceTheoretical Computer Science
Date

January 1, 2012

Authors
Jérémy JeanMaría Naya-PlasenciaThomas Peyrin
Publisher

Springer Berlin Heidelberg


Related search

(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2012English

Unaligned Rebound Attack: Application to Keccak

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2012English

Improved DPA Attack Method on AES Encryption

2015English

An Improved Correlation Attack on A5/1

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2004English

On the Rebound: How Can We Meet Our Carbon Targets in Light of Rebound Effects?

2010English

FPGA Implementation of an Improved Attack Against the DECT Standard Cipher

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2011English

Rotational Rebound Attacks on Reduced Skein

Journal of Cryptology
Applied MathematicsComputer Science ApplicationsSoftware
2013English

Rebound Distinguishers: Results on the Full Whirlpool Compression Function

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2009English

Improved Trustful Routing Protocol to Detect Wormhole Attack in MANET

International Journal of Computer Applications
2013English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy