Search results
Lecture Notes in Computer Science > Fast Software Encryption > Hash Function Cryptanalysis (I) > 224-234
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2010 > General Track on Advanced and Emerging Applications > 599-609
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2009 > Hash Functions I > 144-161
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Session 10: Attacks II > 449-461
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2006 > Hash Functions – I > 8-21
Lecture Notes in Computer Science > Fast Software Encryption > Hash Functions III (Short Presentation) > 318-332
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2006 > Hash Functions > 63-79
Lecture Notes in Computer Science > Fast Software Encryption > Hash Function Cryptanalysis and Design (I) > 19-38
Lecture Notes in Computer Science > Information and Communications Security > Cryptanalysis > 228-241
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2008 > Cryptographic Hash Functions > 53-66