Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n

Mario Lamberger, Florian Mendel

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Originalspracheenglisch
TitelInformation Security
Redakteure/-innenPierangela Samarati, Moti Yung, Fabio Martinelli, Claudio Agostino Ardagna
Herausgeber (Verlag)Springer
Seiten68-78
Band5735
ISBN (Print)3-642-04473-5
DOIs
PublikationsstatusVeröffentlicht - 2009
VeranstaltungInformation Security Conference - Pisa, Italien
Dauer: 7 Sep 20099 Sep 2009

Publikationsreihe

NameLNCS
Herausgeber (Verlag)Springer

Konferenz

KonferenzInformation Security Conference
LandItalien
OrtPisa
Zeitraum7/09/099/09/09

Dies zitieren

Lamberger, M., & Mendel, F. (2009). Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. in P. Samarati, M. Yung, F. Martinelli, & C. A. Ardagna (Hrsg.), Information Security (Band 5735, S. 68-78). (LNCS). Springer. https://doi.org/10.1007/978-3-642-04474-8_6

Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. / Lamberger, Mario; Mendel, Florian.

Information Security. Hrsg. / Pierangela Samarati; Moti Yung; Fabio Martinelli; Claudio Agostino Ardagna. Band 5735 Springer, 2009. S. 68-78 (LNCS).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Lamberger, M & Mendel, F 2009, Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. in P Samarati, M Yung, F Martinelli & CA Ardagna (Hrsg.), Information Security. Bd. 5735, LNCS, Springer, S. 68-78, Pisa, Italien, 7/09/09. https://doi.org/10.1007/978-3-642-04474-8_6
Lamberger M, Mendel F. Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. in Samarati P, Yung M, Martinelli F, Ardagna CA, Hrsg., Information Security. Band 5735. Springer. 2009. S. 68-78. (LNCS). https://doi.org/10.1007/978-3-642-04474-8_6
Lamberger, Mario ; Mendel, Florian. / Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. Information Security. Hrsg. / Pierangela Samarati ; Moti Yung ; Fabio Martinelli ; Claudio Agostino Ardagna. Band 5735 Springer, 2009. S. 68-78 (LNCS).
@inproceedings{dfdfb20833cd448e9b23bd0138ae0112,
title = "Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n",
author = "Mario Lamberger and Florian Mendel",
year = "2009",
doi = "10.1007/978-3-642-04474-8_6",
language = "English",
isbn = "3-642-04473-5",
volume = "5735",
series = "LNCS",
publisher = "Springer",
pages = "68--78",
editor = "Pierangela Samarati and Moti Yung and Fabio Martinelli and Ardagna, {Claudio Agostino}",
booktitle = "Information Security",

}

TY - GEN

T1 - Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n

AU - Lamberger, Mario

AU - Mendel, Florian

PY - 2009

Y1 - 2009

UR - http://www.springerlink.com/content/nv4237737j19g962/

U2 - 10.1007/978-3-642-04474-8_6

DO - 10.1007/978-3-642-04474-8_6

M3 - Conference contribution

SN - 3-642-04473-5

VL - 5735

T3 - LNCS

SP - 68

EP - 78

BT - Information Security

A2 - Samarati, Pierangela

A2 - Yung, Moti

A2 - Martinelli, Fabio

A2 - Ardagna, Claudio Agostino

PB - Springer

ER -