dc.contributor.author | Hasan, Munawar | |
dc.contributor.author | Sanadhya, Somitra Kumar (Advisor) | |
dc.date.accessioned | 2016-09-20T09:04:07Z | |
dc.date.available | 2016-09-20T09:04:07Z | |
dc.date.issued | 2016-09-20T09:04:07Z | |
dc.identifier.uri | https://repository.iiitd.edu.in/jspui/handle/123456789/439 | |
dc.language.iso | en_US | en_US |
dc.subject | Cryptanalysis | en_US |
dc.subject | Perturbation technique | en_US |
dc.subject | Binary search tree | en_US |
dc.subject | AVL tree | en_US |
dc.subject | Computational complexity | en_US |
dc.title | Cryptanalysis of SHA2 based on perturbation technique | en_US |
dc.type | Thesis | en_US |