Comparison of cryptographic hash functions: Difference between revisions

Content deleted Content added
Line 293:
| 48
| [http://www.springerlink.com/content/v6526284mu858v37/ 3]
| [http://eprint.iacr.org/2010/016.pdf 2<sup>64</sup>]
|
| [http://wwweprint.springerlinkiacr.comorg/content/h8q553385534l7632010/016.pdf 2<sup>10270.4</sup>]
|-
| [[MD5]]
Line 336:
| [http://www.springerlink.com/content/u762587644802p38/ 2<sup>62</sup>:19]
|
| [http://eprint.iacr.org/2010/016.pdf 2<sup>184.3</sup>]
|
|}
=== Notes ===