메뉴 건너뛰기




Volumn 3810 LNCS, Issue , 2005, Pages 1-12

The second-preimage attack on MD4

Author keywords

Collision differential path; Hash function; Second preimage; Weak message

Indexed keywords

COMPUTER PRIVACY; DATA PRIVACY; RANDOM PROCESSES; SECURITY OF DATA;

EID: 33744827107     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11599371_1     Document Type: Conference Paper
Times cited : (43)

References (14)
  • 1
    • 78650922644 scopus 로고
    • The MD4 message digest algorithm
    • Springer-Verlag
    • R. L. Rivest, The MD4 Message Digest Algorithm, Advances in Cryptology, Crypto'90, Springer-Verlag, 1991, 303-311.
    • (1991) Advances in Cryptology, Crypto'90 , pp. 303-311
    • Rivest, R.L.1
  • 2
    • 0003195066 scopus 로고
    • The MD5 message-digest algorithm
    • Internet Activities Board, Internet Privacy Task Force
    • R. L. Rivest, The MD5 message-digest algorithm, Request for Comments (RFC 1320), Internet Activities Board, Internet Privacy Task Force, 1992.
    • (1992) Request for Comments RFC , vol.1320
    • Rivest, R.L.1
  • 4
    • 5644280926 scopus 로고
    • Integrity primitives for secure information systems
    • Final Report of RACE Integrity Primitives Evaluation (RIPE-RACE 1040), Springer-Verlag
    • RIPE, Integrity Primitives for Secure Information Systems. Final Report of RACE Integrity Primitives Evaluation (RIPE-RACE 1040), LNCS 1007, Springer-Verlag, 1995.
    • (1995) LNCS , vol.1007
  • 5
    • 0003629990 scopus 로고    scopus 로고
    • FIPS 180, NiST, May
    • FIPS 180, Secure Hash standard, NiST, May 1993.
    • (1993) Secure Hash Standard
  • 6
    • 0003629990 scopus 로고    scopus 로고
    • FIPS 180-1, NIST, US Department of Commerce, Washington D. C., Springer-Verlag
    • FIPS 180-1, Secure hash standard, NIST, US Department of Commerce, Washington D. C., Springer-Verlag, 1996.
    • (1996) Secure Hash Standard
  • 7
    • 0003629990 scopus 로고    scopus 로고
    • FIPS 180-2
    • FIPS 180-2, Secure Hash Standard, http://csrc.nist.gov/publications/, 2002.
    • (2002) Secure Hash Standard
  • 8
    • 0002903148 scopus 로고    scopus 로고
    • Cryptanalysis of MD4, fast software encryption
    • D. Gollmann, Ed., Springer-Verlag
    • H. Dobbertin, Cryptanalysis of MD4, Fast Software Encryption, LNCS 1039, D. Gollmann, Ed., Springer-Verlag, 1996.
    • (1996) LNCS , vol.1039
    • Dobbertin, H.1
  • 9
    • 0346285162 scopus 로고    scopus 로고
    • The first two rounds of MD4 are not one-way
    • H. Dobbertin, The First Two Rounds of MD4 are Not One-Way, Fast Software Encryption, 1998.
    • (1998) Fast Software Encryption
    • Dobbertin, H.1
  • 10
    • 33745179728 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • May
    • X. Y. Wang, H. B. Yu, How to Break MD5 and Other Hash Functions. In Eurocrypt'05, May 2005.
    • (2005) Eurocrypt'05
    • Wang, X.Y.1    Yu, H.B.2
  • 12
    • 33745179728 scopus 로고    scopus 로고
    • Efficient collision search attacks on SHA-0
    • To be appear, August
    • X. Y. Wang, H. B. Yu, Y. L. Yin, Efficient Collision Search Attacks on SHA-0. To be appear in Crypto'05, August 2005.
    • (2005) Crypto'05
    • Wang, X.Y.1    Yu, H.B.2    Yin, Y.L.3
  • 13
    • 33646754186 scopus 로고    scopus 로고
    • Finding collisions in the full SHA-1
    • To be appear, August
    • X. Y. Wang, Y. L. Yin, H. B. Yu, Finding Collisions in the Full SHA-1. To be appear in Crypto'05, August 2005.
    • (2005) Crypto'05
    • Wang, X.Y.1    Yin, Y.L.2    Yu, H.B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.