Login / Signup

Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others.

Yu SasakiKazumaro Aoki
Published in: ACISP (2009)
Keyphrases
  • hash functions
  • databases
  • database
  • nearest neighbor search