Cryptanalysis of the Hash Functions MD4 and RIPEMD

From MaRDI portal
Revision as of 01:58, 9 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5385717

DOI10.1007/11426639_1zbMath1137.94358OpenAlexW1590269592MaRDI QIDQ5385717

Xuejia Lai, Xiaoyun Wang, Dengguo Feng, Hui Chen, Xiu Yuan Yu

Publication date: 6 May 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11426639_1



Related Items

Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL, Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD, New second-preimage attacks on hash functions, Cryptanalysis of full \texttt{RIPEMD-128}, Survey of information security, Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160, Security analysis of randomize-hash-then-sign digital signatures, Cryptanalysis of Grindahl, Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP, Does Secure Time-Stamping Imply Collision-Free Hash Functions?, Allocating rotational cryptanalysis-based preimage attack on 4-round \textsc{Keccak}-224 for quantum setting, Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function, Attacking Reduced Round SHA-256, Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography, A Novel Approach for Constructing One-Way Hash Function Based on a Message Block Controlled 8D Hyperchaotic Map, Collision attack on \({\mathtt Grindahl}\), Collisions for Round-Reduced LAKE, Quantum and semi-quantum lottery: strategies and advantages, Keyed hash function based on a chaotic map, On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak, Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL, A (Second) Preimage Attack on the GOST Hash Function, MD4 is Not One-Way, New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru, Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL, Weaknesses in the HAS-V Compression Function, Design and Analysis on a Parallel Chaos-Based Hash Function, Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck, Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function, Simple hash function using discrete-time quantum walks, One-way hash function construction based on 2D coupled map lattices, Collision Resistant Double-Length Hashing, Herding Hash Functions and the Nostradamus Attack, Cryptanalysis of SHA-0 and reduced SHA-1, Cryptanalysis of the GOST Hash Function, Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures, Parallel hash function construction based on coupled map lattices, Multi-property Preserving Combiners for Hash Functions, Collisions for 70-Step SHA-1: On the Full Cost of Collision Search, Cryptanalysis of the CRUSH Hash Function, The Delicate Issues of Addition with Respect to XOR Differences, New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5, MJH: A Faster Alternative to MDC-2, Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC, Security Analysis of SIMD, Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256, Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others, One-Way Hash Function Based on Delay-Induced Hyperchaos, Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL, Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5, Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques, On the impossibility of highly-efficient blockcipher-based hash functions, A combinatorial analysis of recent attacks on step reduced SHA-2 family, Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security, Hash function based on quantum walks, BREAKING A CHAOTIC IMAGE ENCRYPTION ALGORITHM BASED ON MODULO ADDITION AND XOR OPERATION, How to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash Functions, A quantum hash function with grouped coarse-grained boson sampling, Preimage attacks on 4-round Keccak by solving multivariate quadratic systems


Uses Software