-
1
-
-
84871584138
-
Advances in Cryptology - EUROCRYPT 2005
-
Cramer, R, ed, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, Aarhus, Denmark, May 22-26, Springer, Heidelberg
-
Cramer, R. (ed.): Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, Aarhus, Denmark, May 22-26, 2005. LNCS, vol. 3494, pp. 22-26. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 22-26
-
-
-
3
-
-
38049098390
-
-
De, D., Kumarasubramanian, A., Venkatesan, R.: Inversion attacks on secure hash functions using sat solvers. In: Marques-Silva, J., Sakallah, K.A. (eds.) SAT 2007. LNCS, 4501, pp. 377-382. Springer, Heidelberg (2007)
-
De, D., Kumarasubramanian, A., Venkatesan, R.: Inversion attacks on secure hash functions using sat solvers. In: Marques-Silva, J., Sakallah, K.A. (eds.) SAT 2007. LNCS, vol. 4501, pp. 377-382. Springer, Heidelberg (2007)
-
-
-
-
4
-
-
84985796089
-
-
den Boer, B., Bosselaers, A.: Collisions for the compression function of MD-5. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, 765, pp. 293-304. Springer, Heidelberg (1994)
-
den Boer, B., Bosselaers, A.: Collisions for the compression function of MD-5. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 293-304. Springer, Heidelberg (1994)
-
-
-
-
5
-
-
84947903609
-
-
Dobbertin, H.: The first two rounds of MD4 are not one-way. In: Vaudenay, S. (ed.) FSE 1998. LNCS, 1372, pp. 284-292. Springer, Heidelberg (1998)
-
Dobbertin, H.: The first two rounds of MD4 are not one-way. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol. 1372, pp. 284-292. Springer, Heidelberg (1998)
-
-
-
-
6
-
-
50249175901
-
-
Leurent, G.: MD4 is not one-way. In: Nyberg, K. (ed.) FSE 2008. LNCS, 5086, pp. 412-428. Springer, Heidelberg (2008)
-
Leurent, G.: MD4 is not one-way. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 412-428. Springer, Heidelberg (2008)
-
-
-
-
7
-
-
33646736559
-
On the security of encryption modes of MD4, MD5 and HAVAL
-
Qing, S, Mao, W, López, J, Wang, G, eds, ICICS 2005, Springer, Heidelberg
-
Kim, J.-S., Biryukov, A., Preneel, B., Lee, S.-J.: On the security of encryption modes of MD4, MD5 and HAVAL. In: Qing, S., Mao, W., López, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 147-158. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3783
, pp. 147-158
-
-
Kim, J.-S.1
Biryukov, A.2
Preneel, B.3
Lee, S.-J.4
-
8
-
-
34548114558
-
Tunnels in hash functions: MD5 collisions within a minute. Cryptology ePrint Archive
-
Report 2006/105
-
Klima, V.: Tunnels in hash functions: MD5 collisions within a minute. Cryptology ePrint Archive, Report 2006/105 (2006), http://eprint.iacr.org/
-
(2006)
-
-
Klima, V.1
-
9
-
-
70350680069
-
-
to appear
-
Lee, E., Kim, J., Chang, D., Sung, J., Hong, S.: Second preimage attack on 3-pass HAVAL and partial key-recovery attacks on NMAC/HMAC-3-pass HAVAL (to appear) (2008)
-
(2008)
Second preimage attack on 3-pass HAVAL and partial key-recovery attacks on NMAC/HMAC-3-pass HAVAL
-
-
Lee, E.1
Kim, J.2
Chang, D.3
Sung, J.4
Hong, S.5
-
10
-
-
38149012340
-
Weaknesses in the HAS-V compression function
-
Nam, K.-H, Rhee, G, eds, ICISC 2007, Springer, Heidelberg
-
Mendel, F., Rijmen, V.: Weaknesses in the HAS-V compression function. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol. 4817, pp. 335-345. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4817
, pp. 335-345
-
-
Mendel, F.1
Rijmen, V.2
-
11
-
-
0042715199
-
How easy is collision search? Application to DES
-
Quisquater, J.-J, Vandewalle, J, eds, EUROCRYPT 1989, Springer, Heidelberg
-
Quisquater, J.-J., Delescaille, J.-P.: How easy is collision search? Application to DES. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 429-434. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.434
, pp. 429-434
-
-
Quisquater, J.-J.1
Delescaille, J.-P.2
-
13
-
-
0345490612
-
Cryptanalysis of 3-pass HAVAL
-
Laih, C.-S, ed, ASIACRYPT 2003, Springer, Heidelberg
-
Van Rompay, B., Biryukov, A., Preneel, B., Vandewalle, J.: Cryptanalysis of 3-pass HAVAL. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 228-245. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2894
, pp. 228-245
-
-
Van Rompay, B.1
Biryukov, A.2
Preneel, B.3
Vandewalle, J.4
-
14
-
-
70349878792
-
-
Sasaki, Y., Aoki, K.: Preimage attacks on step-reduced MD5. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, 5107, pp. 282-296. Springer, Heidelberg (2008)
-
Sasaki, Y., Aoki, K.: Preimage attacks on step-reduced MD5. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol. 5107, pp. 282-296. Springer, Heidelberg (2008)
-
-
-
-
15
-
-
70350630742
-
-
Sasaki, Y., Aoki, K.: Preimage attacks on one-block MD4, 63-step MD5 and more. In: Avanzi, R., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, 5381, pp. 103-119. Springer, Heidelberg (2009)
-
Sasaki, Y., Aoki, K.: Preimage attacks on one-block MD4, 63-step MD5 and more. In: Avanzi, R., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 103-119. Springer, Heidelberg (2009)
-
-
-
-
16
-
-
0000275181
-
The complexity of finding cycles in periodic functions
-
Sedgewick, R., Szymanski, T.G., Yao, A.C.-C.: The complexity of finding cycles in periodic functions. SIAM Journal of Computing 11(2), 376-390 (1982)
-
(1982)
SIAM Journal of Computing
, vol.11
, Issue.2
, pp. 376-390
-
-
Sedgewick, R.1
Szymanski, T.G.2
Yao, A.C.-C.3
-
17
-
-
38049156019
-
Chosen-prefix collisions for MD5 and colliding X.509 certificates for different identities
-
Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
-
Stevens, M., Lenstra, A.K., de Weger, B.: Chosen-prefix collisions for MD5 and colliding X.509 certificates for different identities. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 1-22. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 1-22
-
-
Stevens, M.1
Lenstra, A.K.2
de Weger, B.3
-
18
-
-
24944575304
-
-
X. Wang, X. Lai, D. Feng, H. Chen, X. Yu.: Cryptanalysis of the hash functions MD4 and RIPEMD. In: Cramer [1], pp. 1-18 (2005)
-
X. Wang, X. Lai, D. Feng, H. Chen, X. Yu.: Cryptanalysis of the hash functions MD4 and RIPEMD. In: Cramer [1], pp. 1-18 (2005)
-
-
-
-
20
-
-
23944465520
-
-
Yoshida, H., Biryukov, A., De Cannière, C., Lano, J., Preneel, B.: Non-randomness of the full 4 and 5-pass HAVAL. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, 3352, pp. 324-336. Springer, Heidelberg (2005)
-
Yoshida, H., Biryukov, A., De Cannière, C., Lano, J., Preneel, B.: Non-randomness of the full 4 and 5-pass HAVAL. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 324-336. Springer, Heidelberg (2005)
-
-
-
-
21
-
-
33746695391
-
-
Yu, H., Wang, X., Yun, A., Park, S.: Cryptanalysis of the full HAVAL with 4 and 5 passes. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, 4047, pp. 89-110. Springer, Heidelberg (2006)
-
Yu, H., Wang, X., Yun, A., Park, S.: Cryptanalysis of the full HAVAL with 4 and 5 passes. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol. 4047, pp. 89-110. Springer, Heidelberg (2006)
-
-
-
-
22
-
-
84985796228
-
HAVAL - a one-way hashing algorithm with variable length of output
-
Zheng, Y, Seberry, J, eds, AUSCRYPT 1992, Springer, Heidelberg
-
Zheng, Y., Pieprzyk, J., Seberry, J.: HAVAL - a one-way hashing algorithm with variable length of output. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 83-104. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.718
, pp. 83-104
-
-
Zheng, Y.1
Pieprzyk, J.2
Seberry, J.3
|