메뉴 건너뛰기




Volumn 5086 LNCS, Issue , 2008, Pages 412-428

MD4 is not one-way

Author keywords

Cryptanalysis; Hash function; MD4; One way; Preimage

Indexed keywords

COMPUTER CRIME; FUNCTIONS;

EID: 50249175901     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-71039-4_26     Document Type: Conference Paper
Times cited : (76)

References (24)
  • 1
    • 38049111724 scopus 로고    scopus 로고
    • EUROCRYPT 2005
    • Cramer, R.J.F, ed, Springer, Heidelberg
    • Cramer, R.J.F. (ed.): EUROCRYPT 2005. LNCS, vol. 3494. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494
  • 2
    • 38049098390 scopus 로고    scopus 로고
    • De, D., Kumarasubramanian, A., Venkatesan, R.: Inversion Attacks on Secure Hash Functions Using SAT Solvers. In: Marques-Silva, J., Sakallah, K.A. (eds.) SAT 2007. LNCS, 4501, pp. 377-382. Springer, Heidelberg (2007)
    • De, D., Kumarasubramanian, A., Venkatesan, R.: Inversion Attacks on Secure Hash Functions Using SAT Solvers. In: Marques-Silva, J., Sakallah, K.A. (eds.) SAT 2007. LNCS, vol. 4501, pp. 377-382. Springer, Heidelberg (2007)
  • 4
    • 85029523925 scopus 로고    scopus 로고
    • den Boer, B., Bosselaers, A.: An Attack on the Last Two Rounds of MD4. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, 576, pp. 194-203. Springer, Heidelberg (1992)
    • den Boer, B., Bosselaers, A.: An Attack on the Last Two Rounds of MD4. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 194-203. Springer, Heidelberg (1992)
  • 5
    • 0005268716 scopus 로고    scopus 로고
    • Cryptanalysis of MD4
    • Dobbertin, H.: Cryptanalysis of MD4. J. Cryptology 11(4), 253-271 (1998)
    • (1998) J. Cryptology , vol.11 , Issue.4 , pp. 253-271
    • Dobbertin, H.1
  • 6
    • 84947903609 scopus 로고    scopus 로고
    • Dobbertin, H.: The First Two Rounds of MD4 are Not One-Way. In: Vaudenay, S. (ed.) FSE 1998. LNCS, 1372, pp. 284-292. Springer, Heidelberg (1998)
    • Dobbertin, H.: The First Two Rounds of MD4 are Not One-Way. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol. 1372, pp. 284-292. Springer, Heidelberg (1998)
  • 7
    • 50249171320 scopus 로고    scopus 로고
    • Automatic Search of Differential Path in MD4. In: ECRYPT Hash Worshop - Cryptology ePrint Archive
    • Report 2007/206
    • Fouque, P.A., Leurent, G., Nguyen, P.: Automatic Search of Differential Path in MD4. In: ECRYPT Hash Worshop - Cryptology ePrint Archive, Report 2007/206 (2007), http://eprint.iacr.org/
    • (2007)
    • Fouque, P.A.1    Leurent, G.2    Nguyen, P.3
  • 10
    • 34548114558 scopus 로고    scopus 로고
    • Tunnels in Hash Functions: MD5 Collisions Within a Minute. Cryptology ePrint Archive
    • Report 2006/105
    • Klima, V.: Tunnels in Hash Functions: MD5 Collisions Within a Minute. Cryptology ePrint Archive, Report 2006/105 (2006), http://eprint.iacr.org/
    • (2006)
    • Klima, V.1
  • 11
    • 26444507977 scopus 로고    scopus 로고
    • Knudsen, L.R., Mathiassen, J.E.: Preimage and Collision Attacks on MD2. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, 3557, pp. 255-267. Springer, Heidelberg (2005)
    • Knudsen, L.R., Mathiassen, J.E.: Preimage and Collision Attacks on MD2. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 255-267. Springer, Heidelberg (2005)
  • 12
    • 84985820553 scopus 로고
    • Hash Function Based on Block Ciphers
    • Rueppel, R.A, ed, EUROCRYPT 1992, Springer, Heidelberg
    • Lai, X., Massey, J.L.: Hash Function Based on Block Ciphers. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 55-70. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.658 , pp. 55-70
    • Lai, X.1    Massey, J.L.2
  • 13
    • 50249187257 scopus 로고    scopus 로고
    • Mendel, F., Rechberger, C., Rijmen, V.: Update on SHA-1. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, 4622. Springer, Heidelberg (2007), http://rump2007.cr.yp.to/
    • Mendel, F., Rechberger, C., Rijmen, V.: Update on SHA-1. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622. Springer, Heidelberg (2007), http://rump2007.cr.yp.to/
  • 14
    • 38149012340 scopus 로고    scopus 로고
    • Weaknesses in the HAS-V Compression Function
    • Nam, K.-H, Rhee, G, eds, ICISC 2007, Springer, Heidelberg
    • Mendel, F., Rijmen, V.: Weaknesses in the HAS-V Compression Function. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol. 4817, pp. 335-345. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4817 , pp. 335-345
    • Mendel, F.1    Rijmen, V.2
  • 15
    • 26444553252 scopus 로고    scopus 로고
    • The MD2 Hash Function Is Not One-Way
    • Lee, P.J, ed, ASIACRYPT 2004, Springer, Heidelberg
    • Muller, F.: The MD2 Hash Function Is Not One-Way. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 214-229. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3329 , pp. 214-229
    • Muller, F.1
  • 16
    • 78650922644 scopus 로고
    • The MD4 Message Digest Algorithm
    • Menezes, A, Vanstone, S.A, eds, CRYPTO 1990, Springer, Heidelberg
    • Rivest, R.L.: The MD4 Message Digest Algorithm. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 303-311. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.537 , pp. 303-311
    • Rivest, R.L.1
  • 17
    • 84887264252 scopus 로고    scopus 로고
    • Formalizing Human Ignorance
    • Nguyěn, P.Q, ed, VIETCRYPT 2006, Springer, Heidelberg
    • Rogaway, P.: Formalizing Human Ignorance. In: Nguyěn, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 211-228. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4341 , pp. 211-228
    • Rogaway, P.1
  • 18
    • 35048855067 scopus 로고    scopus 로고
    • Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy, B.K., Meier, W. (eds.) FSE 2004. LNCS, 3017, pp. 371-388. Springer, Heidelberg (2004)
    • Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy, B.K., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 371-388. Springer, Heidelberg (2004)
  • 19
    • 38149131464 scopus 로고    scopus 로고
    • Sasaki, Y., Wang, L., Ohta, K., Kunihiro, N.: New Message Difference for MD4. In: Biryukov, A. (ed.) FSE 2007. LNCS, 4593, pp. 329-348. Springer, Heidelberg (2007)
    • Sasaki, Y., Wang, L., Ohta, K., Kunihiro, N.: New Message Difference for MD4. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 329-348. Springer, Heidelberg (2007)
  • 20
    • 84948973102 scopus 로고    scopus 로고
    • Vaudenay, S.: On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER. In: Preneel, B. (ed.) FSE 1994. LNCS, 1008, pp. 286-297. Springer, Heidelberg (1995)
    • Vaudenay, S.: On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 286-297. Springer, Heidelberg (1995)
  • 22
    • 33745171465 scopus 로고    scopus 로고
    • Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, 3621, pp. 17-36. Springer, Heidelberg (2005)
    • Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17-36. Springer, Heidelberg (2005)
  • 24
    • 33744827107 scopus 로고    scopus 로고
    • Yu, H., Wang, G., Zhang, G., Wang, X.: The Second-Preimage Attack on MD4. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, 3810, pp. 1-12. Springer, Heidelberg (2005)
    • Yu, H., Wang, G., Zhang, G., Wang, X.: The Second-Preimage Attack on MD4. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol. 3810, pp. 1-12. Springer, Heidelberg (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.