Back to Results
First PageMeta Content
Preimage attack / Hashing / Search algorithms / MD5 / SHA-1 / Image / SHA-2 / Collision resistance / Function / Cryptographic hash functions / Cryptography / Mathematics


Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl Jian Zou, Wenling Wu, Shuang Wu, and Le Dong Institute of Software Chinese Academy of Sciences Beijing, China
Add to Reading List

Document Date: 2012-12-10 07:37:20


Open Document

File Size: 1,28 MB

Share Result on Facebook

Company

A C S B S R M S A / the AES / /

Country

China / /

/

Event

Force Majeure / /

Facility

Le Dong Institute of Software Chinese Academy / Then store P / Grøstl-512 / /

IndustryTerm

attack algorithm / above attack algorithm / software implementation / /

Organization

Software Chinese Academy of Sciences Beijing / Round-Reduced Grøstl Jian Zou / Wenling Wu / Shuang Wu / and Le Dong Institute / /

Product

MitM / /

Technology

cryptography / MAC algorithms / Complexity The attack algorithm / above attack algorithm / following attack algorithm / digital signature / /

SocialTag