Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2

Ji Li, Takanori Isobe, Kyoji Shibutani. Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2. In Anne Canteaut, editor, Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers. Volume 7549 of Lecture Notes in Computer Science, pages 264-286, Springer, 2012. [doi]

Abstract

Abstract is missing.