baikenov-as 1
1.
Cryptanalysis the SHA-256 Hash Function Using Rainbow Tables
2.
SIMULATION OF THE RAINBOW ATTACK ON THE SHA-256 HASH FUNCTION
1