Amanote Research

Amanote Research

    RegisterSign In

Discover open access scientific publications

Search, annotate, share and cite publications


Publications by Le Dong

(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2012English

Related publications

Improved Rebound Attack on the Finalist Grøstl

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2012English

A Meet-In-The-Middle Attack on Reduced-Round Crypton

Software Engineering and Applications
2012English

Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2012English

Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2011English

New Preimage Attacks Against Reduced SHA-1

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2012English

Second-Preimage Analysis of Reduced SHA-1

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2010English

Practical Attacks on the Round-Reduced PRINCE

IET Information Security
Computer NetworksSoftwareInformation SystemsCommunications
2017English

A Keyed Hash Function

IOSR Journal of Mathematics
2013English

Boomerang Attack on Step-Reduced SHA-512

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2015English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy