Amanote Research

Amanote Research

    RegisterSign In

Cryptanalysis of the CRUSH Hash Function

doi 10.1007/978-3-540-77360-3_5
Full Text
Open PDF
Abstract

Available in full text

Date

Unknown

Authors
Matt HenricksenLars R. Knudsen
Publisher

Springer Berlin Heidelberg


Related search

Cryptanalysis of a Hash Function Based on Isotopy of Quasigroups

Tatra Mountains Mathematical Publications
Mathematics
2010English

Cryptanalysis of the ESSENCE Family of Hash Functions

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2010English

Cryptanalysis of Hash Functions With Structures

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2009English

A Keyed Hash Function

IOSR Journal of Mathematics
2013English

Collision Resistance of the JH Hash Function

IEEE Transactions on Information Theory
Computer Science ApplicationsInformation SystemsLibraryInformation Sciences
2012English

Analysis of the Kupyna-256 Hash Function

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2016English

A Framework for the Design of One-Way Hash Functions Including Cryptanalysis of Damgård's One-Way Function Based on a Cellular Automaton

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1993English

Preimages for the Tillich-Zémor Hash Function

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2011English

Interpreting Hash Function Security Proofs

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2010English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy