-
1
-
-
77954576149
-
-
U.S. Department of Commerce, November 2
-
U.S. Department of Commerce, National Institute of Standards and Technology: Federal Register/Notices Vol. 72(212), November 2 (2007), http://csrc.nist.gov/groups/ST/hash/documents/FR-Notice-Nov07.pdf
-
(2007)
Federal Register/Notices
, vol.72
, Issue.212
-
-
-
4
-
-
67049155483
-
A preimage attack for 52-steps HAS-160
-
Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. Springer, Heidelberg
-
Sasaki, Y., Aoki, K.: A preimage attack for 52-steps HAS-160. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 302-317. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5461
, pp. 302-317
-
-
Sasaki, Y.1
Aoki, K.2
-
5
-
-
70350302881
-
Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1
-
Halevi, S. (ed.) Advances in Cryptology - CRYPTO 2009. Springer, Heidelberg
-
Aoki, K., Sasaki, Y.: Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1. In: Halevi, S. (ed.) Advances in Cryptology - CRYPTO 2009. LNCS, vol. 5677, pp. 70-89. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 70-89
-
-
Aoki, K.1
Sasaki, Y.2
-
6
-
-
33745872495
-
Finding collision on 45-step HAS-160
-
Won, D.H., Kim, S. (eds.) ICISC 2005. Springer, Heidelberg
-
Yun, A., Sung, S.H., Park, S., Chang, D., Hong, S., Cho, H.S.: Finding collision on 45-step HAS-160. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 146-155. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3935
, pp. 146-155
-
-
Yun, A.1
Sung, S.H.2
Park, S.3
Chang, D.4
Hong, S.5
Cho, H.S.6
-
7
-
-
34547417720
-
Collision search attack for 53-step HAS- 160
-
Rhee, M.S., Lee, B. (eds.) ICISC 2006. Springer, Heidelberg
-
Cho, H.-S., Park, S., Sung, S.H., Yun, A.: Collision search attack for 53-step HAS- 160. In: Rhee, M.S., Lee, B. (eds.) ICISC 2006. LNCS, vol. 4296, pp. 286-295. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4296
, pp. 286-295
-
-
Cho, H.-S.1
Park, S.2
Sung, S.H.3
Yun, A.4
-
8
-
-
38149024218
-
Colliding message pair for 53-step HAS-160
-
Nam, K.-H., Rhee, G. (eds.) ICISC 2007. Springer, Heidelberg
-
Mendel, F., Rijmen, V.: Colliding message pair for 53-step HAS-160. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol. 4817, pp. 324-334. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4817
, pp. 324-334
-
-
Mendel, F.1
Rijmen, V.2
-
9
-
-
38349120806
-
A meet-in-the-middle collision attack against the new FORK-256
-
Srinathan, K., Rangan, C.P., Yung, M. (eds.) Springer, Heidelberg
-
Saarinen, M.J.O.: A meet-in-the-middle collision attack against the new FORK-256. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007, vol. 4859, pp. 10-17. Springer, Heidelberg (2007)
-
(2007)
INDOCRYPT 2007
, vol.4859
, pp. 10-17
-
-
Saarinen, M.J.O.1
-
10
-
-
50249175901
-
MD4 is not one-way
-
Nyberg, K. (ed.) FSE 2008. Springer, Heidelberg
-
Leurent, G.: MD4 is not one-way. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 412-428. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5086
, pp. 412-428
-
-
Leurent, G.1
-
11
-
-
70350630742
-
Preimage attacks on one-block MD4, 63-step MD5 and more
-
Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. Springer, Heidelberg
-
Aoki, K., Sasaki, Y.: Preimage attacks on one-block MD4, 63-step MD5 and more. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 103-119. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5381
, pp. 103-119
-
-
Aoki, K.1
Sasaki, Y.2
-
12
-
-
70350634268
-
Preimage attacks on 3-pass HAVAL and step-reduced MD5
-
Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. Springer, Heidelberg
-
Aumasson, J.P., Meier, W., Mendel, F.: Preimage attacks on 3-pass HAVAL and step-reduced MD5. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 120-135. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5381
, pp. 120-135
-
-
Aumasson, J.P.1
Meier, W.2
Mendel, F.3
-
13
-
-
58349091571
-
Preimage attacks on 3, 4, and 5-pass HAVAL
-
Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
-
Sasaki, Y., Aoki, K.: Preimage attacks on 3, 4, and 5-pass HAVAL. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 253-271. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5350
, pp. 253-271
-
-
Sasaki, Y.1
Aoki, K.2
-
14
-
-
77954599772
-
-
Available at NIST home page
-
Chang, D., Hong, S., Kang, C., Kang, J., Kim, J., Lee, C., Lee, J., Lee, J., Lee, S., Lee, Y., Lim, J., Sung, J.: ARIRANG. Available at NIST home page, http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/submissions-rnd1.html
-
ARIRANG
-
-
Chang, D.1
Hong, S.2
Kang, C.3
Kang, J.4
Kim, J.5
Lee, C.6
Lee, J.7
Lee, J.8
Lee, S.9
Lee, Y.10
Lim, J.11
Sung, J.12
-
15
-
-
70549113340
-
-
Cryptology ePrint Archive, Report 2009/147
-
Hong, D., Kim, W.H., Koo, B.: Preimage attack on ARIRANG. Cryptology ePrint Archive, Report 2009/147 (2009), http://eprint.iacr.org/2009/147
-
(2009)
Preimage Attack on ARIRANG
-
-
Hong, D.1
Kim, W.H.2
Koo, B.3
-
16
-
-
77954592602
-
-
Number 8A-2 in USB memory distributed at ICISC 2009
-
Hong, D., Kim, W.H., Koo, B., Kwon, D.: Preimage attacks on reduced steps of ARIRANG and PKC 1998-Hash. Number 8A-2 in USB memory distributed at ICISC 2009 (2009)
-
(2009)
Preimage Attacks on Reduced Steps of ARIRANG and PKC 1998-Hash
-
-
Hong, D.1
Kim, W.H.2
Koo, B.3
Kwon, D.4
-
17
-
-
67650679771
-
Finding preimages in full MD5 faster than exhaustive search
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Sasaki, Y., Aoki, K.: Finding preimages in full MD5 faster than exhaustive search. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 134-152. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5479
, pp. 134-152
-
-
Sasaki, Y.1
Aoki, K.2
-
18
-
-
84949216135
-
HAS-V: A new hash function with variable output length
-
Stinson, D.R., Tavares, S. (eds.) SAC 2000. Springer, Heidelberg
-
Nan Kyoung Park, J.H.H., Lee, P.J.: HAS-V: A new hash function with variable output length. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol. 2012, pp. 202-216. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2012
, pp. 202-216
-
-
Nan Kyoung Park, J.H.H.1
Lee, P.J.2
-
19
-
-
38149012340
-
Weaknesses in the HAS-V compression function
-
Nam, K.-H., Rhee, G. (eds.) ICISC 2007. Springer, Heidelberg
-
Mendel, F., Rijmen, V.: Weaknesses in the HAS-V compression function. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol. 4817, pp. 335-345. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4817
, pp. 335-345
-
-
Mendel, F.1
Rijmen, V.2
-
20
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
21
-
-
51849105110
-
Preimages for reduced SHA-0 and SHA-1
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Cannière, C.D., Rechberger, C.: Preimages for reduced SHA-0 and SHA-1. In:Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 179-202. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 179-202
-
-
Cannière, C.D.1
Rechberger, C.2
-
22
-
-
24944541563
-
n work
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
n work. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 474-490. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 474-490
-
-
Kelsey, J.1
Schneier, B.2
|