A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Curves, codes, and cryptography
[article]
2011
However, the FSBday attack was designed to run on 8 nodes of the Coding and Cryptography Computer Cluster (CCCC) at Technische Universiteit Eindhoven[Lan] which have a total hard-disk space of only 5.5 ...
The results presented here are based on the article "FSBday: Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB" [BLN + 09] which is joint work with Bernstein, Lange ...
doi:10.6100/ir711052
fatcat:iauqje46hjaqjeb4b57lw57i5a