Preimage Attacks on Reduced Tiger and SHA-2
From MaRDI portal
Publication:3391568
DOI10.1007/978-3-642-03317-9_9zbMath1248.94073OpenAlexW1522989667MaRDI QIDQ3391568
Takanori Isobe, Kyoji Shibutani
Publication date: 11 August 2009
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-03317-9_9
Related Items (5)
Quantum collision attacks on reduced SHA-256 and SHA-512 ⋮ Boomerang Attack on Step-Reduced SHA-512 ⋮ All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach ⋮ Two Passes of Tiger Are Not One-Way ⋮ Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
This page was built for publication: Preimage Attacks on Reduced Tiger and SHA-2