Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
2012 ◽
pp. 264-286
◽
2013 ◽
Vol 28
(1)
◽
pp. 129-143
◽
2012 ◽
Vol 55
(11)
◽
pp. 2521-2529
◽
Keyword(s):
Keyword(s):
2017 ◽
Vol 11
(3)
◽