First Page | Document Content | |
---|---|---|
Date: 2012-12-10 07:37:20Preimage attack Hashing Search algorithms MD5 SHA-1 Image SHA-2 Collision resistance Function Cryptographic hash functions Cryptography Mathematics | Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl Jian Zou, Wenling Wu, Shuang Wu, and Le Dong Institute of Software Chinese Academy of Sciences Beijing, ChinaAdd to Reading ListSource URL: eprint.iacr.orgDownload Document from Source WebsiteFile Size: 1,28 MBShare Document on Facebook |