Memoryless unbalanced meet-in-the-middle attacks: impossible results and applications
From MaRDI portal
Publication:5168545
DOI10.1007/978-3-319-07536-5_16zbMATH Open1353.94072OpenAlexW1904945831MaRDI QIDQ5168545FDOQ5168545
Authors: Yu Sasaki
Publication date: 7 July 2014
Published in: Applied Cryptography and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-07536-5_16
Recommendations
hash functionSHA-13-collisionFloyd's cycle-finding algorithmlimited-birthday distinguishermemoryless attackunbalanced meet-in-the-middle
Cited In (3)
This page was built for publication: Memoryless unbalanced meet-in-the-middle attacks: impossible results and applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5168545)