Search results for: Scott Contini
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2006 > Attacks on Hash Functions > 37-53
Lecture Notes in Computer Science > Information and Communications Security > Cryptanalysis > 296-305
Lecture Notes in Computer Science > Fast Software Encryption > Hash Function Cryptanalysis (I) > 207-223
Lecture Notes in Computer Science > Fast Software Encryption > Hash Function Cryptanalysis and Design (I) > 19-38
Lecture Notes in Computer Science > Advances in Cryptology - EUROCRYPT 2006 > Hash Functions > 165-182
Cluster Computing > 2012 > 15 > 1 > 53-68