𝔖 Bobbio Scriptorium
✦   LIBER   ✦

[Lecture Notes in Computer Science] Advances in Information and Computer Security Volume 6434 || Matrix Representation of Conditions for the Collision Attack of SHA-1 and Its Application to the Message Modification

✍ Scribed by Echizen, Isao; Kunihiro, Noboru; Sasaki, Ryoichi


Book ID
117991277
Publisher
Springer Berlin Heidelberg
Year
2010
Weight
324 KB
Category
Article
ISBN
3642168256

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


[Lecture Notes of the Institute for Comp
✍ Meghanathan, Natarajan; Chaki, Nabendu; Nagamalai, Dhinaharan πŸ“‚ Article πŸ“… 2012 πŸ› Springer Berlin Heidelberg 🌐 English βš– 260 KB

The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 55 revised full papers presented in this volume were carefully reviewed andse

[Lecture Notes in Electrical Engineering
✍ Qian, Zhihong; Cao, Lei; Su, Weilian; Wang, Tingkai; Yang, Huamin πŸ“‚ Article πŸ“… 2012 πŸ› Springer Berlin Heidelberg 🌐 English βš– 236 KB

CSIE 2011 is an international scientific Congress for distinguished scholars engaged in scientific, engineering and technological research, dedicated to build a platform for exploring and discussing the future of Computer Science and Information Engineering with existing and potential application sc

[Lecture Notes of the Institute for Comp
✍ Meghanathan, Natarajan; Chaki, Nabendu; Nagamalai, Dhinaharan πŸ“‚ Article πŸ“… 2012 πŸ› Springer Berlin Heidelberg 🌐 English βš– 337 KB

The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 66 revised full papers presented in this volume were carefully reviewed andse