Digital Library


Search: "[ keyword: Hash Function ]" (3)

  1. Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions

  2. Improving the Diffusion of the Stream Cipher Salsa20 by Employing a Chaotic Logistic Map

  3. Security Properties of Domain Extenders for Cryptographic Hash Functions