Login / Signup
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2.
Jian Guo
San Ling
Christian Rechberger
Huaxiong Wang
Published in:
ASIACRYPT (2010)
Keyphrases
</>
countermeasures
real time
databases
improved algorithm
malicious users
search engine
high dimensional
hyperplane
high availability
computer security
chosen plaintext