Login / Signup

Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2.

Jian GuoSan LingChristian RechbergerHuaxiong Wang
Published in: ASIACRYPT (2010)
Keyphrases
  • countermeasures
  • real time
  • databases
  • improved algorithm
  • malicious users
  • search engine
  • high dimensional
  • hyperplane
  • high availability
  • computer security
  • chosen plaintext