Search Word(s) in Title, Keywords, Authors, and Abstract: (Second) Preimage Attack

Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions
Gautham Sekar and Soumyadeep Bhattacharya
Page: 310~312, Vol. 12, No.2, 2016
10.3745/JIPS.03.0021

Keywords: Cryptanalysis, Hash Function, (Second) Preimage Attack
Show / Hide Abstract