Login / Signup
Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others.
Yu Sasaki
Kazumaro Aoki
Published in:
ACISP (2009)
Keyphrases
</>
hash functions
databases
database
nearest neighbor search