Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2

From MaRDI portal
Publication:4899710