Sciweavers

CRYPTO
2007
Springer
149views Cryptology» more  CRYPTO 2007»
13 years 11 months ago
Hash Functions and the (Amplified) Boomerang Attack
Abstract. Since Crypto 2004, hash functions have been the target of many attacks which showed that several well-known functions such as SHA-0 or MD5 can no longer be considered sec...
Antoine Joux, Thomas Peyrin