搜索历史记录选项已关闭,请开启搜索历史记录选项。
作者: Mitsugu Iwamoto , Yu Sasaki , Thomas Peyrin
DOI:
关键词:
摘要: … preimage attack for a compression function (also called pseudo-preimage attack) can be transformed into a preimage … on 38-round reduced SHA-256 compression function has been pro…