-
1
-
-
58349114602
-
-
Aoki, K., Sasaki, Y.: Preimage attacks on one-block MD4, 63-step MD5 and more. In: Avanzi, R., Keliher, L., Sica, F. (eds.) Selected Areas in Cryptography -Workshop Records of 15th Annual International Workshop, SAC 2008, Sackville, New Brunswick, Canada, pp. 82-98 (2008)
-
Aoki, K., Sasaki, Y.: Preimage attacks on one-block MD4, 63-step MD5 and more. In: Avanzi, R., Keliher, L., Sica, F. (eds.) Selected Areas in Cryptography -Workshop Records of 15th Annual International Workshop, SAC 2008, Sackville, New Brunswick, Canada, pp. 82-98 (2008)
-
-
-
-
2
-
-
58349108436
-
-
Aumasson, J.-P., Meier, W., Mendel, F.: Preimage attacks on 3-pass HAVAL and step-reduced MD5. In: Avanzi, R., Keliher. L., Sica. F. (eds.) Selected Areas in Cryptography -Workshop Records of 15th Annual International Workshop. SAC 2008. Sackville, New Brunswick, Canada, pp. 99-114 (2008), (also appeared in IACR Cryptology ePrint Archive: Report http://eprint.iacr.org/2008/183)
-
Aumasson, J.-P., Meier, W., Mendel, F.: Preimage attacks on 3-pass HAVAL and step-reduced MD5. In: Avanzi, R., Keliher. L., Sica. F. (eds.) Selected Areas in Cryptography -Workshop Records of 15th Annual International Workshop. SAC 2008. Sackville, New Brunswick, Canada, pp. 99-114 (2008), (also appeared in IACR Cryptology ePrint Archive: Report http://eprint.iacr.org/2008/183)
-
-
-
-
3
-
-
51849105110
-
-
De Cannière, C., Rechberger, C.: Preimages for reduced SHA-O and SHA-1. In: Wagner. D. (ed.) CRYPTO 2008. LNCS. 5157, pp. 179-202. Springer. Heidelberg (2008) (slides on preliminary results were appeared at ESC 2008 seminar, http ://wiki.uni.lu/esc/)
-
De Cannière, C., Rechberger, C.: Preimages for reduced SHA-O and SHA-1. In: Wagner. D. (ed.) CRYPTO 2008. LNCS. vol. 5157, pp. 179-202. Springer. Heidelberg (2008) (slides on preliminary results were appeared at ESC 2008 seminar, http ://wiki.uni.lu/esc/)
-
-
-
-
4
-
-
84947903609
-
-
Dobbertin, H.: The first two rounds of MD4 are not one-way. In: Vaudenay, S. (ed.) FSE 1998. LNCS. 1372, pp. 284-292. Springer, Heidelberg (1998)
-
Dobbertin, H.: The first two rounds of MD4 are not one-way. In: Vaudenay, S. (ed.) FSE 1998. LNCS. vol. 1372, pp. 284-292. Springer, Heidelberg (1998)
-
-
-
-
5
-
-
33750029023
-
-
Kim. J., Biryukov, A., Preneel, B., Hong, S.: On the security of HMAC and NMAC based on HAVAL. MD4, MD5, SHA-O and SHA-1. In: De Prisco. R., Yung, M. (eds.) SCN 2006. LNCS. 4116. pp. 242-256. Springer, Heidelberg (2006)
-
Kim. J., Biryukov, A., Preneel, B., Hong, S.: On the security of HMAC and NMAC based on HAVAL. MD4, MD5, SHA-O and SHA-1. In: De Prisco. R., Yung, M. (eds.) SCN 2006. LNCS. vol. 4116. pp. 242-256. Springer, Heidelberg (2006)
-
-
-
-
6
-
-
33646736559
-
On the security of encryption modes of MD4, MD5 and HAVAL
-
Qing, S, Mao, W, López, J, Wang, G, eds, TCICS 2005, Springer, Heidelberg
-
Kim, J., Biryukov, A., Preneel, B., Lee, S.: On the security of encryption modes of MD4, MD5 and HAVAL. In: Qing, S., Mao, W., López, J., Wang, G. (eds.) TCICS 2005. LNCS, vol. 3783, pp. 147-158. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3783
, pp. 147-158
-
-
Kim, J.1
Biryukov, A.2
Preneel, B.3
Lee, S.4
-
7
-
-
50249137694
-
-
Lee, E., Kim, J., Chang, D., Sung, J., Hong. S.: Second preimage attack on 3-pass HAVAL and partial key-recovery attacks on NMAC/HMAC-3-pass HAVAL. In: Nyberg, K. (ed.) FSE 2008. LNCS, 5086. pp. 189-206. Springer, Heidelberg (2008)
-
Lee, E., Kim, J., Chang, D., Sung, J., Hong. S.: Second preimage attack on 3-pass HAVAL and partial key-recovery attacks on NMAC/HMAC-3-pass HAVAL. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086. pp. 189-206. Springer, Heidelberg (2008)
-
-
-
-
8
-
-
50249175901
-
-
Leurent, G.: MD4 is not one-way. In: Nyberg, K. (ed.) FSE 2008. LNCS, 5086, pp. 412-428. Springer, Heidelberg (2008)
-
Leurent, G.: MD4 is not one-way. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 412-428. Springer, Heidelberg (2008)
-
-
-
-
9
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)
-
(1997)
Handbook of applied cryptography
-
-
Menezes, A.J.1
van Oorschot, P.C.2
Vanstone, S.A.3
-
11
-
-
38149071590
-
-
Suzuki, K., Kurosawa, K.: How to find many collisions of 3-pass HAVAL. In: Miyaji, A., Kikuchi. H., Rannenberg. K. (eds.) IWSEC 2007. LNCS, 4752, pp. 428-443. Springer, Heidelberg (2007) (A preliminary version was appeared in IACR Cryptology ePrint Archive: Report 2007/079, http://eprint.iacr.org/2007/ 079)
-
Suzuki, K., Kurosawa, K.: How to find many collisions of 3-pass HAVAL. In: Miyaji, A., Kikuchi. H., Rannenberg. K. (eds.) IWSEC 2007. LNCS, vol. 4752, pp. 428-443. Springer, Heidelberg (2007) (A preliminary version was appeared in IACR Cryptology ePrint Archive: Report 2007/079, http://eprint.iacr.org/2007/ 079)
-
-
-
-
12
-
-
0345490612
-
Cryptanalysis of 3-pass HAVAL
-
Laih, C-S, ed, ASIACRYPT 2003, Springer, Heidelberg
-
van Roinpay, B., Biryukov, A., Preneel, B., Vandewalle, J.: Cryptanalysis of 3-pass HAVAL. In: Laih, C-S. (ed.) ASIACRYPT 2003. LNCS. vol. 2894. pp. 228-245. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2894
, pp. 228-245
-
-
van Roinpay, B.1
Biryukov, A.2
Preneel, B.3
Vandewalle, J.4
-
13
-
-
33746362587
-
An attack on hash function HAVAL-128
-
Information Sciences
-
Wang, X., Feng. D., Yu, X.: An attack on hash function HAVAL-128. Science in China (Information Sciences) 48(5), 545-556 (2005)
-
(2005)
Science in China
, vol.48
, Issue.5
, pp. 545-556
-
-
Wang, X.1
Feng, D.2
Yu, X.3
-
14
-
-
24944591357
-
How to break MD5 and other hash functions
-
Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
15
-
-
58349101254
-
-
Wang, Z., Zhang, H., Qin, Z., Meng, Q.: Cryptanalysis of 4-pass HAVAL. IACR Cryptology ePrint Archive: Report 2006/161 (2006), http://eprint.iacr.org/ 2006/161
-
Wang, Z., Zhang, H., Qin, Z., Meng, Q.: Cryptanalysis of 4-pass HAVAL. IACR Cryptology ePrint Archive: Report 2006/161 (2006), http://eprint.iacr.org/ 2006/161
-
-
-
-
16
-
-
23944465520
-
-
Yoshida, H., Biryukov, A., De Cannière, C., Lano, J., Preneel, B.: Non-randomness of the full 4 and 5-pass HAVAL. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, 3352, pp. 324-336. Springer, Heidelberg (2005)
-
Yoshida, H., Biryukov, A., De Cannière, C., Lano, J., Preneel, B.: Non-randomness of the full 4 and 5-pass HAVAL. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 324-336. Springer, Heidelberg (2005)
-
-
-
-
17
-
-
33746695391
-
-
Yu, H., Wang, X., Yun, A., Park, S.: Cryptanalysis of the full HAVAL with 4 and 5 passes. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, 4047, pp. 89-110. Springer. Heidelberg (2006)
-
Yu, H., Wang, X., Yun, A., Park, S.: Cryptanalysis of the full HAVAL with 4 and 5 passes. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol. 4047, pp. 89-110. Springer. Heidelberg (2006)
-
-
-
-
18
-
-
84985796228
-
HAVAL -one-way hashing algorithm with variable length of output
-
Zheng, Y, Seberry, J, eds, AUSCRYPT 1992, Springer, Heidelberg
-
Zheng, Y., Pieprzyk, J., Seberry, J.: HAVAL -one-way hashing algorithm with variable length of output. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 83-104. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.718
, pp. 83-104
-
-
Zheng, Y.1
Pieprzyk, J.2
Seberry, J.3
|