baikenov-as 1

1. Cryptanalysis the SHA-256 Hash Function Using Rainbow Tables
2. SIMULATION OF THE RAINBOW ATTACK ON THE SHA-256 HASH FUNCTION
1