Login / Signup
Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1.
Kazumaro Aoki
Yu Sasaki
Published in:
CRYPTO (2009)
Keyphrases
</>
hash functions
hyperplane
real time
knn
countermeasures
watermarking algorithm
denial of service attacks
malicious attacks