Cryptology ePrint Archive: Report 2013/150

Available versions in chronological order


Practical (Second) Preimage Attacks on TCS_SHA-3
Gautham Sekar and Soumyadeep Bhattacharya

Practical (Second) Preimage Attacks on TCS_SHA-3
Gautham Sekar and Soumyadeep Bhattacharya

Practical (Second) Preimage Attacks on TCS_SHA-3
Gautham Sekar and Soumyadeep Bhattacharya

Practical (Second) Preimage Attacks on TCS_SHA-3
Gautham Sekar and Soumyadeep Bhattacharya

Practical (Second) Preimage Attacks on TCS_SHA-3
Gautham Sekar and Soumyadeep Bhattacharya


[ Cryptology ePrint archive ]