Publisher
Springer Berlin Heidelberg
Reference44 articles.
1. Lecture Notes in Computer Science;E. Andreeva,2008
2. Lecture Notes in Computer Science;E. Andreeva,2009
3. Aoki, K., Sasaki, Y.: Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1. In: Halevi [11], pp. 70–89
4. Biham, E., Chen, R., Joux, A., Carribault, P., Lemuet, C., Jalby, W.: Collisions of SHA-0 and Reduced SHA-1. In: Cramer [5], pp. 36–57
5. Lecture Notes in Computer Science,2005
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献