메뉴 건너뛰기




Volumn 4047 LNCS, Issue , 2006, Pages 89-110

Cryptanalysis of the full HAVAL with 4 and 5 passes

Author keywords

Collision; Differential path; Hash function; Message modification

Indexed keywords

DIFFERENTIAL EQUATIONS; FUNCTIONS;

EID: 33746695391     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11799313_7     Document Type: Conference Paper
Times cited : (21)

References (11)
  • 1
    • 0345490612 scopus 로고    scopus 로고
    • Cryptanalysis of 3-pass HAVAL
    • Asiacrypt 2003
    • B. V. Rompay, A. Biryukov, B. Preneel, and J. Vandewalle. Cryptanalysis of 3-Pass HAVAL, Asiacrypt 2003, LNCS 2894, pp. 228-245, 2003.
    • (2003) LNCS , vol.2894 , pp. 228-245
    • Rompay, B.V.1    Biryukov, A.2    Preneel, B.3    Vandewalle, J.4
  • 2
    • 23944465520 scopus 로고    scopus 로고
    • Non-randomness of the pull 4 and 5-pass HAVAL
    • SON 2004
    • H. Yoshida, A. Biryukov, C. D. Canniere, J. Lano, and B. Preneel. Non-randomness of the Pull 4 and 5-Pass HAVAL; SON 2004, LNCS 3352, pp. 324-336, 2005.
    • (2005) LNCS , vol.3352 , pp. 324-336
    • Yoshida, H.1    Biryukov, A.2    Canniere, C.D.3    Lano, J.4    Preneel, B.5
  • 3
    • 78650922644 scopus 로고
    • The MD4 message digest algorithm
    • Crypto'90
    • R. L. Rivest. The MD4 Message Digest Algorithm, Crypto'90, LNCS 537, pp. 303-311, 1991.
    • (1991) LNCS , vol.537 , pp. 303-311
    • Rivest, R.L.1
  • 4
    • 0003602325 scopus 로고
    • The MD5 message-digest algorithm, request for comments
    • Internet Activities Board, Internet Privacy Task Force
    • R. L. Rivest. The MD5 Message-Digest Algorithm, Request for Comments(RFC 1320), Internet Activities Board, Internet Privacy Task Force, 1992.
    • (1992) RFC , vol.1320
    • Rivest, R.L.1
  • 6
    • 24944575304 scopus 로고    scopus 로고
    • Cryptanalysis for hash functions MD4 and RIPEMD
    • Eurocrypt'05
    • X. Y. Wang, X. J. Lai, D. Feng, H. Chen, and X. Yu. Cryptanalysis for Hash Functions MD4 and RIPEMD, Eurocrypt'05, LNCS 3494, pp. 1-18, 2005.
    • (2005) LNCS , vol.3494 , pp. 1-18
    • Wang, X.Y.1    Lai, X.J.2    Feng, D.3    Chen, H.4    Yu, X.5
  • 7
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • Eurocrypt'05
    • X. Y. Wang and H. B. Yu. How to Break MD5 and Other Hash Functions, Eurocrypt'05, LNCS 3494, pp. 19-35, 2005.
    • (2005) LNCS , vol.3494 , pp. 19-35
    • Wang, X.Y.1    Yu, H.B.2
  • 8
    • 33745122987 scopus 로고    scopus 로고
    • Efficient collision search attacks on SHA-0
    • Crypto'05
    • X. Y. Wang, H. B. Yu, and Y. L. Yin. Efficient Collision Search Attacks on SHA-0, Crypto'05, LNCS 3621, pp. 1-16, 2005.
    • (2005) LNCS , vol.3621 , pp. 1-16
    • Wang, X.Y.1    Yu, H.B.2    Yin, Y.L.3
  • 9
    • 33745171465 scopus 로고    scopus 로고
    • Finding collisions on the full SHA-1
    • Crypto '05
    • X. Y. Wang, Y. L. Yin, and H. B. Yu. Finding collisions on the Full SHA-1, Crypto '05, LNCS 3621, pp. 17-36, 2005.
    • (2005) LNCS , vol.3621 , pp. 17-36
    • Wang, X.Y.1    Yin, Y.L.2    Yu, H.B.3
  • 11
    • 84985796228 scopus 로고
    • HAVAL -A one-way hashing algorithm with variable length of output
    • Auscrypt'92
    • Y. Zheng, J. Pieprzyk and J. Seberry. HAVAL -A One-way Hashing Algorithm with Variable Length of Output, Auscrypt'92, LNCS 718, pp. 83-104, 1993.
    • (1993) LNCS , vol.718 , pp. 83-104
    • Zheng, Y.1    Pieprzyk, J.2    Seberry, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.