-
1
-
-
38049111724
-
EUROCRYPT 2005
-
Cramer, R.J.F, ed, Springer, Heidelberg
-
Cramer, R.J.F. (ed.): EUROCRYPT 2005. LNCS, vol. 3494. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
-
-
-
2
-
-
38049098390
-
-
De, D., Kumarasubramanian, A., Venkatesan, R.: Inversion Attacks on Secure Hash Functions Using SAT Solvers. In: Marques-Silva, J., Sakallah, K.A. (eds.) SAT 2007. LNCS, 4501, pp. 377-382. Springer, Heidelberg (2007)
-
De, D., Kumarasubramanian, A., Venkatesan, R.: Inversion Attacks on Secure Hash Functions Using SAT Solvers. In: Marques-Silva, J., Sakallah, K.A. (eds.) SAT 2007. LNCS, vol. 4501, pp. 377-382. Springer, Heidelberg (2007)
-
-
-
-
4
-
-
85029523925
-
-
den Boer, B., Bosselaers, A.: An Attack on the Last Two Rounds of MD4. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, 576, pp. 194-203. Springer, Heidelberg (1992)
-
den Boer, B., Bosselaers, A.: An Attack on the Last Two Rounds of MD4. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 194-203. Springer, Heidelberg (1992)
-
-
-
-
5
-
-
0005268716
-
Cryptanalysis of MD4
-
Dobbertin, H.: Cryptanalysis of MD4. J. Cryptology 11(4), 253-271 (1998)
-
(1998)
J. Cryptology
, vol.11
, Issue.4
, pp. 253-271
-
-
Dobbertin, H.1
-
6
-
-
84947903609
-
-
Dobbertin, H.: The First Two Rounds of MD4 are Not One-Way. In: Vaudenay, S. (ed.) FSE 1998. LNCS, 1372, pp. 284-292. Springer, Heidelberg (1998)
-
Dobbertin, H.: The First Two Rounds of MD4 are Not One-Way. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol. 1372, pp. 284-292. Springer, Heidelberg (1998)
-
-
-
-
7
-
-
50249171320
-
Automatic Search of Differential Path in MD4. In: ECRYPT Hash Worshop - Cryptology ePrint Archive
-
Report 2007/206
-
Fouque, P.A., Leurent, G., Nguyen, P.: Automatic Search of Differential Path in MD4. In: ECRYPT Hash Worshop - Cryptology ePrint Archive, Report 2007/206 (2007), http://eprint.iacr.org/
-
(2007)
-
-
Fouque, P.A.1
Leurent, G.2
Nguyen, P.3
-
10
-
-
34548114558
-
Tunnels in Hash Functions: MD5 Collisions Within a Minute. Cryptology ePrint Archive
-
Report 2006/105
-
Klima, V.: Tunnels in Hash Functions: MD5 Collisions Within a Minute. Cryptology ePrint Archive, Report 2006/105 (2006), http://eprint.iacr.org/
-
(2006)
-
-
Klima, V.1
-
11
-
-
26444507977
-
-
Knudsen, L.R., Mathiassen, J.E.: Preimage and Collision Attacks on MD2. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, 3557, pp. 255-267. Springer, Heidelberg (2005)
-
Knudsen, L.R., Mathiassen, J.E.: Preimage and Collision Attacks on MD2. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 255-267. Springer, Heidelberg (2005)
-
-
-
-
12
-
-
84985820553
-
Hash Function Based on Block Ciphers
-
Rueppel, R.A, ed, EUROCRYPT 1992, Springer, Heidelberg
-
Lai, X., Massey, J.L.: Hash Function Based on Block Ciphers. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 55-70. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.658
, pp. 55-70
-
-
Lai, X.1
Massey, J.L.2
-
13
-
-
50249187257
-
-
Mendel, F., Rechberger, C., Rijmen, V.: Update on SHA-1. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, 4622. Springer, Heidelberg (2007), http://rump2007.cr.yp.to/
-
Mendel, F., Rechberger, C., Rijmen, V.: Update on SHA-1. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622. Springer, Heidelberg (2007), http://rump2007.cr.yp.to/
-
-
-
-
14
-
-
38149012340
-
Weaknesses in the HAS-V Compression Function
-
Nam, K.-H, Rhee, G, eds, ICISC 2007, Springer, Heidelberg
-
Mendel, F., Rijmen, V.: Weaknesses in the HAS-V Compression Function. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol. 4817, pp. 335-345. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4817
, pp. 335-345
-
-
Mendel, F.1
Rijmen, V.2
-
15
-
-
26444553252
-
The MD2 Hash Function Is Not One-Way
-
Lee, P.J, ed, ASIACRYPT 2004, Springer, Heidelberg
-
Muller, F.: The MD2 Hash Function Is Not One-Way. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 214-229. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3329
, pp. 214-229
-
-
Muller, F.1
-
16
-
-
78650922644
-
The MD4 Message Digest Algorithm
-
Menezes, A, Vanstone, S.A, eds, CRYPTO 1990, Springer, Heidelberg
-
Rivest, R.L.: The MD4 Message Digest Algorithm. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 303-311. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.537
, pp. 303-311
-
-
Rivest, R.L.1
-
17
-
-
84887264252
-
Formalizing Human Ignorance
-
Nguyěn, P.Q, ed, VIETCRYPT 2006, Springer, Heidelberg
-
Rogaway, P.: Formalizing Human Ignorance. In: Nguyěn, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 211-228. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4341
, pp. 211-228
-
-
Rogaway, P.1
-
18
-
-
35048855067
-
-
Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy, B.K., Meier, W. (eds.) FSE 2004. LNCS, 3017, pp. 371-388. Springer, Heidelberg (2004)
-
Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy, B.K., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 371-388. Springer, Heidelberg (2004)
-
-
-
-
19
-
-
38149131464
-
-
Sasaki, Y., Wang, L., Ohta, K., Kunihiro, N.: New Message Difference for MD4. In: Biryukov, A. (ed.) FSE 2007. LNCS, 4593, pp. 329-348. Springer, Heidelberg (2007)
-
Sasaki, Y., Wang, L., Ohta, K., Kunihiro, N.: New Message Difference for MD4. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 329-348. Springer, Heidelberg (2007)
-
-
-
-
20
-
-
84948973102
-
-
Vaudenay, S.: On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER. In: Preneel, B. (ed.) FSE 1994. LNCS, 1008, pp. 286-297. Springer, Heidelberg (1995)
-
Vaudenay, S.: On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 286-297. Springer, Heidelberg (1995)
-
-
-
-
21
-
-
33745152524
-
-
1, pp
-
Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the Hash Functions MD4 and RIPEMD. In: [1], pp. 1-18
-
Cryptanalysis of the Hash Functions MD4 and RIPEMD
, pp. 1-18
-
-
Wang, X.1
Lai, X.2
Feng, D.3
Chen, H.4
Yu, X.5
-
22
-
-
33745171465
-
-
Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, 3621, pp. 17-36. Springer, Heidelberg (2005)
-
Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17-36. Springer, Heidelberg (2005)
-
-
-
-
24
-
-
33744827107
-
-
Yu, H., Wang, G., Zhang, G., Wang, X.: The Second-Preimage Attack on MD4. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, 3810, pp. 1-12. Springer, Heidelberg (2005)
-
Yu, H., Wang, G., Zhang, G., Wang, X.: The Second-Preimage Attack on MD4. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol. 3810, pp. 1-12. Springer, Heidelberg (2005)
-
-
-
|