Finding Good Differential Patterns for Attacks on SHA-1

Author(s):  
Krystian Matusiewicz ◽  
Josef Pieprzyk
Sign in / Sign up

Export Citation Format

Share Document