-
1
-
-
67049122485
-
Preimage attacks on one-block MD4, 63-step MD5 and more
-
Sackville, Canada, pp
-
Aoki, K., Sasaki, Y.: Preimage attacks on one-block MD4, 63-step MD5 and more. In: Workshop Records of SAC 2008, Sackville, Canada, pp. 82-98 (2008)
-
(2008)
Workshop Records of SAC
, pp. 82-98
-
-
Aoki, K.1
Sasaki, Y.2
-
2
-
-
67049148371
-
-
Aumasson, J.-P., Meier, W., Mendel, F.: Preimage attacks on 3-pass HAVAL and step-reduced MD5. In: Workshop Records of SAC 2008, Sackville, Canada, pp. 99-114 (2008); ePrint version is available at IACR Cryptology ePrint Archive: Report 2008/183, http://eprint.iacr.org/2008/183.pdf
-
Aumasson, J.-P., Meier, W., Mendel, F.: Preimage attacks on 3-pass HAVAL and step-reduced MD5. In: Workshop Records of SAC 2008, Sackville, Canada, pp. 99-114 (2008); ePrint version is available at IACR Cryptology ePrint Archive: Report 2008/183, http://eprint.iacr.org/2008/183.pdf
-
-
-
-
3
-
-
51849105110
-
-
De Canniere, C., Rechberger, C.: Preimages for Reduced SHA-0 and SHA-1. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, 5157, pp. 179-202. Springer, Heidelberg (2008); slides on preliminary results were appeared at ESC 2008 seminar, http://wiki.uni.lu/esc/
-
De Canniere, C., Rechberger, C.: Preimages for Reduced SHA-0 and SHA-1. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 179-202. Springer, Heidelberg (2008); slides on preliminary results were appeared at ESC 2008 seminar, http://wiki.uni.lu/esc/
-
-
-
-
4
-
-
34547417720
-
-
Cho, H.-S., Park, S., Sung, S.H., Yun, A.: Collision search attack for 53-step HAS- 160. In: Rhee, M.S., Lee, B. (eds.) ICISC 2006. LNCS, 4296, pp. 286-295. Springer, Heidelberg (2006)
-
Cho, H.-S., Park, S., Sung, S.H., Yun, A.: Collision search attack for 53-step HAS- 160. In: Rhee, M.S., Lee, B. (eds.) ICISC 2006. LNCS, vol. 4296, pp. 286-295. Springer, Heidelberg (2006)
-
-
-
-
5
-
-
38049098390
-
-
De, D., Kumarasubramanian, A., Venkatesan, R.: Inversion attacks on secure hash functions using SAT solvers. In: Marques-Silva, J., Sakallah, K.A. (eds.) SAT 2007. LNCS, 4501, pp. 377-382. Springer, Heidelberg (2007)
-
De, D., Kumarasubramanian, A., Venkatesan, R.: Inversion attacks on secure hash functions using SAT solvers. In: Marques-Silva, J., Sakallah, K.A. (eds.) SAT 2007. LNCS, vol. 4501, pp. 377-382. Springer, Heidelberg (2007)
-
-
-
-
6
-
-
50249175901
-
-
Leurent, G.: MD4 is not one-way. In: Nyberg, K. (ed.) FSE 2008. LNCS, 5086, pp. 412-428. Springer, Heidelberg (2008)
-
Leurent, G.: MD4 is not one-way. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 412-428. Springer, Heidelberg (2008)
-
-
-
-
7
-
-
38149024218
-
-
Mendel, F., Rijmen, V.: Colliding message pair for 53-step HAS-160. In: Nam, K.- H., Rhee, G. (eds.) ICISC 2007. LNCS, 4817, pp. 324-334. Springer, Heidelberg (2007)
-
Mendel, F., Rijmen, V.: Colliding message pair for 53-step HAS-160. In: Nam, K.- H., Rhee, G. (eds.) ICISC 2007. LNCS, vol. 4817, pp. 324-334. Springer, Heidelberg (2007)
-
-
-
-
8
-
-
38149012340
-
Weaknesses in the HAS-V Compression Function
-
Nam, K.-H, Rhee, G, eds, ICISC 2007, Springer, Heidelberg
-
Mendel, F., Rijmen, V.: Weaknesses in the HAS-V Compression Function. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol. 4817, pp. 335-345. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4817
, pp. 335-345
-
-
Mendel, F.1
Rijmen, V.2
-
9
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)
-
(1997)
Handbook of applied cryptography
-
-
Menezes, A.J.1
van Oorschot, P.C.2
Vanstone, S.A.3
-
10
-
-
84949216135
-
-
Park, N.K., Hwang, J.H., Lee, P.J.: HAS-V: A new hash function with variable output length. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, 2012, pp. 202-216. Springer, Heidelberg (2001)
-
Park, N.K., Hwang, J.H., Lee, P.J.: HAS-V: A new hash function with variable output length. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol. 2012, pp. 202-216. Springer, Heidelberg (2001)
-
-
-
-
12
-
-
70349878792
-
-
Sasaki, Y., Aoki, K.: Preimage attacks on step-reduced MD5. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, 5107, pp. 282-296. Springer, Heidelberg (2008)
-
Sasaki, Y., Aoki, K.: Preimage attacks on step-reduced MD5. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol. 5107, pp. 282-296. Springer, Heidelberg (2008)
-
-
-
-
13
-
-
58349091571
-
Preimage attacks on 3, 4, and 5-pass HAVAL
-
Pieprzyk, J.P, ed, ASIACRYPT 2008, Springer, Heidelberg
-
Sasaki, Y., Aoki, K.: Preimage attacks on 3, 4, and 5-pass HAVAL. In: Pieprzyk, J.P. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 253-271. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5350
, pp. 253-271
-
-
Sasaki, Y.1
Aoki, K.2
-
15
-
-
67049120858
-
-
U.S. Department of Commerce, National Institute of Standards and Technology, Federal Information Processing Standards Publication 180-3
-
U.S. Department of Commerce, National Institute of Standards and Technology. Announcing the SECURE HASH STANDARD (Federal Information Processing Standards Publication 180-3) (2008), http://csrc.nist.gov/publications/fips/ fips180-3/fips180-3-final.pdf
-
(2008)
Announcing the SECURE HASH STANDARD
-
-
-
16
-
-
33745872495
-
-
Yun, A., Sung, S.H., Park, S., Chang, D., Hong, S.H., Cho, H.-S.: Finding collision on 45-step HAS-160. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, 3935, pp. 146-155. Springer, Heidelberg (2006)
-
Yun, A., Sung, S.H., Park, S., Chang, D., Hong, S.H., Cho, H.-S.: Finding collision on 45-step HAS-160. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 146-155. Springer, Heidelberg (2006)
-
-
-
|