Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions
Gautham Sekar, Soumyadeep Bhattacharya, Journal of Information Processing Systems Vol. 12, No. 2, pp. 310-312, Jun. 2016
Keywords: cryptanalysis, Hash Function, (Second) Preimage Attack
Fulltext:
Abstract
Statistics
Show / Hide Statistics
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
|
Cite this article
[APA Style]
Sekar, G. & Bhattacharya, S. (2016). Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions. Journal of Information Processing Systems, 12(2), 310-312. DOI: 10.3745/JIPS.03.0021.
[IEEE Style]
G. Sekar and S. Bhattacharya, "Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions," Journal of Information Processing Systems, vol. 12, no. 2, pp. 310-312, 2016. DOI: 10.3745/JIPS.03.0021.
[ACM Style]
Gautham Sekar and Soumyadeep Bhattacharya. 2016. Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions. Journal of Information Processing Systems, 12, 2, (2016), 310-312. DOI: 10.3745/JIPS.03.0021.