Memoryless unbalanced meet-in-the-middle attacks: impossible results and applications (Q5168545)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Memoryless unbalanced meet-in-the-middle attacks: impossible results and applications |
scientific article; zbMATH DE number 6313980
| Language | Label | Description | Also known as |
|---|---|---|---|
| default for all languages | No label defined |
||
| English | Memoryless unbalanced meet-in-the-middle attacks: impossible results and applications |
scientific article; zbMATH DE number 6313980 |
Statements
Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and Applications (English)
0 references
7 July 2014
0 references
unbalanced meet-in-the-middle
0 references
memoryless attack
0 references
Floyd's cycle-finding algorithm
0 references
hash function
0 references
SHA-1
0 references
3-collision
0 references
limited-birthday distinguisher
0 references
0.8605698347091675
0 references
0.8147943615913391
0 references
0.7738397121429443
0 references
0.7495064735412598
0 references
0.7487923502922058
0 references