The following publications are possibly variants of this publication:
- Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVALYu Sasaki, Wataru Komatsubara, Yasuhide Sakai, Lei Wang, Mitsugu Iwamoto, Kazuo Sakiyama, Kazuo Ohta. secrypt 2013: 111-122
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to WhirlpoolYu Sasaki. fse 2011: 378-396 [doi]
- Integer Linear Programming for Three-Subset Meet-in-the-Middle Attacks: Application to GIFTYu Sasaki. IWSEC 2018: 227-243 [doi]
- Quantum Meet-in-the-Middle Attacks: Applications to Generic Feistel ConstructionsAkinori Hosoyamada, Yu Sasaki. iacr, 2017:1229, 2017. [doi]
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to WhirlpoolYu Sasaki. ieicet, 96-A(1):121-130, 2013. [doi]