Article Using carry-truncated addition to analyze add-rotate-xor hash algorithms
Rebecca E. Field, Brant C. Jones
2013
Field, Rebecca E. and Jones, Brant C.. "Using carry-truncated addition to analyze add-rotate-xor hash algorithms" Journal of Mathematical Cryptology, vol. 7, no. 2, 2013, pp. 97-110. https://doi.org/10.1515/jmc-2012-0019
Field, R. & Jones, B. (2013). Using carry-truncated addition to analyze add-rotate-xor hash algorithms. Journal of Mathematical Cryptology, 7(2), 97-110. https://doi.org/10.1515/jmc-2012-0019
Field, R. and Jones, B. (2013) Using carry-truncated addition to analyze add-rotate-xor hash algorithms. Journal of Mathematical Cryptology, Vol. 7 (Issue 2), pp. 97-110. https://doi.org/10.1515/jmc-2012-0019
Field, Rebecca E. and Jones, Brant C.. "Using carry-truncated addition to analyze add-rotate-xor hash algorithms" Journal of Mathematical Cryptology 7, no. 2 (2013): 97-110. https://doi.org/10.1515/jmc-2012-0019
Field R, Jones B. Using carry-truncated addition to analyze add-rotate-xor hash algorithms. Journal of Mathematical Cryptology. 2013;7(2): 97-110. https://doi.org/10.1515/jmc-2012-0019
Copied to clipboard