Preimage attack

Results: 147



#Item
1Cryptography / Cryptographic hash functions / Error detection and correction / Streebog / GOST / Preimage attack / SHA-3 / MD5 / SHA-2 / SHA-1 / Hash function / BLAKE

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo1 , J´er´emy Jean1 , Ga¨etan Leurent2 , Thomas Peyrin1 , and Lei Wang1 1

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:34
2Cryptography / Cryptographic hash functions / Preimage attack / Advantage / Permutation / Random oracle / Birthday attack

Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers Phillip Rogaway1 and John Steinberger2 1 2

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2008-07-20 11:55:06
3

(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version) Shuang Wu1 , Dengguo Feng1 , Wenling Wu1 , Jian Guo2 , Le Dong1 , and Jian Zou1 1 State Key Laboratory of Information Securit

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-09-10 00:05:29
    4Cryptography / Cryptographic hash functions / Hashing / Error detection and correction / Universal one-way hash function / Preimage attack / Collision resistance / Hash function / Hash list / SHA-3 / One-way compression function

    Introduction MD New Results I

    Add to Reading List

    Source URL: www.hyperelliptic.org

    Language: English - Date: 2008-09-27 14:59:29
    5Forking lemma / Random oracle / Preimage attack / Digital signature / Collision resistance / Elliptic Curve DSA / Standard model / MD5 / Birthday attack / Cryptography / Cryptographic hash functions / Schnorr signature

    Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1 IBM Research – Zurich, Switzerland

    Add to Reading List

    Source URL: www.neven.org

    Language: English - Date: 2012-04-18 06:08:49
    6MD5 / Search algorithms / Collision attack / MD4 / Hash function / Merkle–Damgård construction / Preimage attack / Crypt / SHA-1 / Cryptography / Cryptographic hash functions / Hashing

    An algorithm for MD5 single-block collision attack using high-performance computing cluster

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2014-11-07 01:57:01
    7SHA-2 / Collision attack / MD5 / Preimage attack / MD4 / Cryptanalysis / Collision / Hash function / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / SHA-1

    Improving Local Collisions: New Attacks on Reduced SHA-256? Florian Mendel, Tomislav Nad, Martin Schl¨affer IAIK, Graz University of Technology, Austria

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-04-20 04:23:58
    8Search algorithms / Hashing / Preimage attack / Merkle–Damgård construction / Hash function / Alexander Sotirov / Cryptographic hash functions / Cryptography / MD5

    MD5 considered harmful today Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger Presentation by: Hamidhasan G. Ahmed

    Add to Reading List

    Source URL: www.cis.upenn.edu

    Language: English - Date: 2013-09-26 13:48:46
    9Merkle–Damgård construction / SHA-1 / Collision resistance / MD5 / Collision attack / MDC-2 / Preimage attack / Hash function / Fast Syndrome Based Hash / Cryptographic hash functions / Cryptography / One-way compression function

    More Insights on Blockcipher-Based Hash Functions Yiyuan Luo, Xuejia Lai Department of Computer Science and Engineering, Shanghai Jiaotong University

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2010-12-15 23:12:24
    10Random oracle / Preimage attack / Hash function / MDC-2 / Merkle–Damgård construction / SHA-1 / Oracle machine / SHA-2 / Advantage / Cryptography / Cryptographic hash functions / One-way compression function

    A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions∗ Zheng Gong, Xuejia Lai and Kefei Chen Department of Computer Science and Engineering Shanghai Jiaotong University, China neoyan@sjtu.e

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2009-08-12 04:16:52
    UPDATE