Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack

Title
Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack
Authors
Keywords
SHA-512, SHA-256, DHA-256, hash functions, boomerang attack, SHA-512, SHA-2256, DHA-256, 飞去来器攻击
Journal
Science China-Information Sciences
Volume 59, Issue 5, Pages -
Publisher
Springer Nature
Online
2016-03-11
DOI
10.1007/s11432-015-5389-4

Ask authors/readers for more resources

Reprint

Contact the author

Find the ideal target journal for your manuscript

Explore over 38,000 international journals covering a vast array of academic fields.

Search

Create your own webinar

Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.

Create Now