Meet-In-The-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1

Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-642-03356-8_5
Full Text
Abstract

Available in full text

Date
Authors
Publisher

Springer Berlin Heidelberg