Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
problems function » problems functions, problems fiction, problem functional
function https » functions https, fiction https
https function » its function, sites function, ups function
function fork » function form, function work, functions work
fork https » work https, work http, book https
problems function » problems functions, problems fiction, problem functional
function https » functions https, fiction https
https function » its function, sites function, ups function
function fork » function form, function work, functions work
fork https » work https, work http, book https
1
Published 2006
Table of Contents:
“... -- A New Dedicated 256-Bit Hash Function: FORK-256 -- Some Plausible Constructions of Double-Block...”View full text
Electronic
eBook
2
Published 2007
Table of Contents:
“... -- Cryptanalysis of FORK-256 -- The Grindahl Hash Functions -- Stream Ciphers Cryptanalysis (I) -- Overtaking VEST...”View full text
Electronic
eBook
3
Published 2007
Table of Contents:
“... -- Extending FORK-256 Attack to the Full Hash Function -- Attacking Reduced-Round Versions of the SMS4 Block...”View full text
Electronic
eBook
4
Published 2006
Table of Contents:
“... Variants of the FORK-256 Hash Function -- Second Preimages for SMASH -- Digital Signatures (I) -- A...”View full text
Electronic
eBook
5
Published 2007
Table of Contents:
“... Attack Against the New FORK-256 -- Multilane HMAC— Security beyond the Birthday Limit -- Elliptic Curve...”View full text
Electronic
eBook
6
Published 2008
Table of Contents:
“... - Local Forking Proofs Model -- Fully-Simulatable Oblivious Set Transfer -- Efficient Disjointness Tests...”View full text
Electronic
eBook
7
Published 2013
Table of Contents:
“... of Second-Order Functionals -- Deconstructing General References via Game Semantics -- Separation Logic...”View full text
Electronic
eBook



