(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others

Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-642-34047-5_8
Full Text
Abstract

Available in full text

Date
Authors
Publisher

Springer Berlin Heidelberg


Related search