Last update: Sun Mar 31 02:49:53 MDT 2019
@Article{Li:2012:CMM, author = "Ji Li and Takanori Isobe and Kyoji Shibutani", title = "Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to {SHA-2}", journal = j-LECT-NOTES-COMP-SCI, volume = "7549", pages = "264--286", year = "2012", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-34047-5_16", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Dec 19 15:24:44 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2012i.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-34047-5_16/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-34047-5", book-URL = "http://www.springerlink.com/content/978-3-642-34047-5", fjournal = "Lecture Notes in Computer Science", }