Sign in
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2.
Jian Guo
San Ling
Christian Rechberger
Huaxiong Wang
Published in:
IACR Cryptol. ePrint Arch. (2010)
Keyphrases
</>
countermeasures
databases
multiscale
image watermarking
real time
high dimensional
anomaly detection
data distribution
hyperplane
improved algorithm
web intelligence
hash functions
chosen plaintext