Weaknesses in the HAS-V Compression Function
From MaRDI portal
Publication:5385531
DOI10.1007/978-3-540-76788-6_27zbMath1337.94057OpenAlexW2110407451MaRDI QIDQ5385531
Florian Mendel, Vincent Rijmen
Publication date: 6 May 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://www.cosic.esat.kuleuven.be/publications/article-1141.pdf
Related Items (7)
MD4 is Not One-Way ⋮ Cryptanalysis of MD2 ⋮ Cryptanalysis of MDC-2 ⋮ Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others ⋮ Two Passes of Tiger Are Not One-Way ⋮ Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5 ⋮ Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
Cites Work
- Unnamed Item
- Unnamed Item
- Cryptanalysis of the Full HAVAL with 4 and 5 Passes
- A Study of the MD5 Attacks: Insights and Improvements
- Colliding Message Pair for 53-Step HAS-160
- Collision Search Attack for 53-Step HAS-160
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- How to Break MD5 and Other Hash Functions
- Finding Collisions in the Full SHA-1
- Finding SHA-1 Characteristics: General Results and Applications
This page was built for publication: Weaknesses in the HAS-V Compression Function