Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Andrey Bogdanov
On Security Arguments of the Second Round SHA-3 Candidates
International Journal of Information Security
Information Systems
Risk
Computer Networks
Communications
Reliability
Safety
Quality
Software
Collision Attacks on AES-Based MAC: Alpha-Mac
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Related publications
Hardware Authentication Based on PUFs and SHA-3 2nd Round Candidates
The Intel AES Instructions Set and the SHA-3 Candidates
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Second-Preimage Analysis of Reduced SHA-1
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Endovascular Therapy: The Second Round Begins
Journal of Stroke
Neurology
Cardiovascular Medicine
Cardiology
Second-Order Differential Collisions for Reduced SHA-256
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
HMAC-SHA-2 Authentication Protocols in the User-Based Security Model (USM) for SNMPv3
The Forgotten Second Window: A Pictorial Review of Round Window Pathologies
American Journal of Neuroradiology
Medicine
Nuclear Medicine
Neurology
Imaging
Radiology
Reinventing a Security: Arguments for a Public Interest Definition
SSRN Electronic Journal
Preimages for Reduced SHA-0 and SHA-1
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science