Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others

Yu Sasaki, Kazumaro Aoki. Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others. In Colin Boyd, Juan Manuel González Nieto, editors, Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings. Volume 5594 of Lecture Notes in Computer Science, pages 214-231, Springer, 2009. [doi]

@inproceedings{SasakiA09:0,
  title = {Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others},
  author = {Yu Sasaki and Kazumaro Aoki},
  year = {2009},
  doi = {10.1007/978-3-642-02620-1_15},
  url = {http://dx.doi.org/10.1007/978-3-642-02620-1_15},
  researchr = {https://researchr.org/publication/SasakiA09%3A0},
  cites = {0},
  citedby = {0},
  pages = {214-231},
  booktitle = {Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  editor = {Colin Boyd and Juan Manuel González Nieto},
  volume = {5594},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-642-02619-5},
}