IIIT-Delhi Institutional Repository

Cryptanalysis of SHA2 based on perturbation technique

Show simple item record

dc.contributor.author Hasan, Munawar
dc.contributor.author Sanadhya, Somitra Kumar (Advisor)
dc.date.accessioned 2016-09-20T09:04:07Z
dc.date.available 2016-09-20T09:04:07Z
dc.date.issued 2016-09-20T09:04:07Z
dc.identifier.uri https://repository.iiitd.edu.in/jspui/handle/123456789/439
dc.language.iso en_US en_US
dc.subject Cryptanalysis en_US
dc.subject Perturbation technique en_US
dc.subject Binary search tree en_US
dc.subject AVL tree en_US
dc.subject Computational complexity en_US
dc.title Cryptanalysis of SHA2 based on perturbation technique en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Repository


Advanced Search

Browse

My Account