Cited By
View all- Bogdanov AShibutani K(2013)Generalized Feistel networks revisitedDesigns, Codes and Cryptography10.1007/s10623-012-9660-z66:1-3(75-97)Online publication date: 1-Jan-2013
- Ohtahara CSasaki YShimoyama T(2010)Preimage attacks on step-reduced RIPEMD-128 and RIPEMD-160Proceedings of the 6th international conference on Information security and cryptology10.5555/2031933.2031950(169-186)Online publication date: 20-Oct-2010
- Fleischmann EForler CGorski MLucks S(2010)TWISTER π – a framework for secure and fast hash functionsInternational Journal of Applied Cryptography10.1504/IJACT.2010.0338002:1(68-81)Online publication date: 1-Jul-2010
- Show More Cited By