共 50 条
- [3] Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool FAST SOFTWARE ENCRYPTION (FSE 2011), 2011, 6733 : 378 - 396
- [4] Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT I, 2021, 12696 : 771 - 804
- [5] Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT III, 2021, 12827 : 278 - 308
- [7] Meet-in-the-Middle Preimage Attacks Revisited New Results on MD5 and HAVAL PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 111 - 122
- [9] Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1 ADVANCES IN CRYPTOLOGY - CRYPTO 2009, 2009, 5677 : 70 - 89
- [10] Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 : 683 - 701