International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2

Authors:
Ji Li
Takanori Isobe
Kyoji Shibutani
Download:
DOI: 10.1007/978-3-642-34047-5_16
URL: https://www.iacr.org/archive/fse2012/75490268/75490268.pdf
Search ePrint
Search Google
Conference: FSE 2012
BibTeX
@inproceedings{fse-2012-24463,
  title={Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2},
  booktitle={FSE},
  publisher={Springer},
  volume={7549},
  pages={264-286},
  url={https://www.iacr.org/archive/fse2012/75490268/75490268.pdf},
  doi={10.1007/978-3-642-34047-5_16},
  author={Ji Li and Takanori Isobe and Kyoji Shibutani},
  year=2012
}