(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others
Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-642-34047-5_8
Full Text
Open PDFAbstract
Available in full text
Date
January 1, 2012
Authors
Publisher
Springer Berlin Heidelberg