Return to Article Details
χ2 Attacks on Block-Cipher based Compression Functions
Download
Download PDF