Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE
From MaRDI portal
Publication:3457134
DOI10.1007/978-3-662-47989-6_33zbMath1375.94123OpenAlexW2283663022MaRDI QIDQ3457134
Thomas Espitau, Pierre-Alain Fouque, Pierre Karpman
Publication date: 10 December 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-47989-6_33
Cites Work
- BLAKE2: Simpler, Smaller, Fast as MD5
- New Preimage Attacks against Reduced SHA-1
- Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
- The Hash Function Family LAKE
- Preimages for Reduced SHA-0 and SHA-1
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Higher Order Derivatives and Differential Cryptanalysis
- Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
- Analysis of BLAKE2
Related Items (7)
Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks ⋮ Meet-in-the-middle preimage attacks on sponge-based hashing ⋮ Weak Keys for AEZ, and the External Key Padding Attack ⋮ Automated meet-in-the-middle attack goes to Feistel ⋮ Generic MitM attack frameworks on sponge constructions ⋮ Automatic search of meet-in-the-middle preimage attacks on AES-like hashing ⋮ New records of pre-image search of reduced SHA-1 using SAT solvers
This page was built for publication: Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE