Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Le Dong
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Related publications
Improved Rebound Attack on the Finalist Grøstl
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
A Meet-In-The-Middle Attack on Reduced-Round Crypton
Software Engineering and Applications
Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
New Preimage Attacks Against Reduced SHA-1
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Second-Preimage Analysis of Reduced SHA-1
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Practical Attacks on the Round-Reduced PRINCE
IET Information Security
Computer Networks
Software
Information Systems
Communications
A Keyed Hash Function
IOSR Journal of Mathematics
Boomerang Attack on Step-Reduced SHA-512
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science