Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions
Gautham Sekar, Soumyadeep Bhattacharya, Journal of Information Processing Systems Vol. 12, No. 2, pp. 310-312, Jun. 2016
https://doi.org/10.3745/JIPS.03.0021
Keywords: cryptanalysis, Hash Function, (Second) Preimage Attack
Fulltext:
Abstract
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[APA Style]
Sekar, G. & Bhattacharya, S. (2016). Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions. Journal of Information Processing Systems, 12(2), 310-312. DOI: 10.3745/JIPS.03.0021.
[IEEE Style]
G. Sekar and S. Bhattacharya, "Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions," Journal of Information Processing Systems, vol. 12, no. 2, pp. 310-312, 2016. DOI: 10.3745/JIPS.03.0021.
[ACM Style]
Gautham Sekar and Soumyadeep Bhattacharya. 2016. Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions. Journal of Information Processing Systems, 12, 2, (2016), 310-312. DOI: 10.3745/JIPS.03.0021.