How good are some 2nd round SHA3 hashes when their compression functions are weak?

Praveen Gauravaram (Author)

    Research output: Non-textual formSound/Visual production (digital)Research

    69 Downloads (Pure)
    Original languageEnglish
    Publication date2010
    Publication statusPublished - 2010
    Event30th Annual International Cryptology Conference - University of California, Santa Barbara, CA, United States
    Duration: 15 Aug 201019 Aug 2010
    Conference number: 30

    Conference

    Conference30th Annual International Cryptology Conference
    Number30
    LocationUniversity of California
    CountryUnited States
    CitySanta Barbara, CA
    Period15/08/201019/08/2010

    Cite this