Sciweavers

CRYPTO
2007
Springer
149views Cryptology» more  CRYPTO 2007»
14 years 3 months ago
Hash Functions and the (Amplified) Boomerang Attack
Abstract. Since Crypto 2004, hash functions have been the target of many attacks which showed that several well-known functions such as SHA-0 or MD5 can no longer be considered sec...
Antoine Joux, Thomas Peyrin