|
Volumn 4833 LNCS, Issue , 2007, Pages 536-550
|
Cryptanalysis of the tiger hash function
|
Author keywords
Collision; Cryptanalysis; Differential attack; Hash functions; Near collision; Pseudo collision; Pseudo near collision
|
Indexed keywords
COMPUTATIONAL COMPLEXITY;
DATA REDUCTION;
FUNCTION EVALUATION;
SECURITY OF DATA;
CRYPTANALYSIS;
HASH COMPUTATIONS;
HASH FUNCTION;
PSEUDO-COLLISION;
CRYPTOGRAPHY;
|
EID: 38149133737
PISSN: 03029743
EISSN: 16113349
Source Type: Book Series
DOI: 10.1007/978-3-540-76900-2_33 Document Type: Conference Paper |
Times cited : (20)
|
References (4)
|