Pages that link to "Item:Q3644195"
From MaRDI portal
The following pages link to Preimage Attacks on One-Block MD4, 63-Step MD5 and More (Q3644195):
Displaying 27 items.
- Key recovery attacks on iterated Even-Mansour encryption schemes (Q321305) (← links)
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations (Q831640) (← links)
- A single-key attack on the full GOST block cipher (Q1946603) (← links)
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing (Q2056714) (← links)
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks (Q2129000) (← links)
- New attacks on IDEA with at least 6 rounds (Q2344046) (← links)
- Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD (Q2637303) (← links)
- Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL (Q2889860) (← links)
- Bicliques with Minimal Data and Time Complexity for AES (Q2942833) (← links)
- A Framework for Automated Independent-Biclique Cryptanalysis (Q2946897) (← links)
- Collisions of MMO-MD5 and Their Impact on Original MD5 (Q3011908) (← links)
- A Single-Key Attack on the Full GOST Block Cipher (Q3013090) (← links)
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool (Q3013095) (← links)
- (Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach (Q3073708) (← links)
- Meet-in-the-Middle Attacks on Reduced-Round XTEA (Q3073711) (← links)
- Cryptanalysis of Reduced-Round Whirlwind (Q3194587) (← links)
- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL (Q3399202) (← links)
- Cryptanalysis of the Round-Reduced GOST Hash Function (Q3454162) (← links)
- All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach (Q3455500) (← links)
- New Attacks on Feistel Structures with Improved Memory Complexities (Q3457122) (← links)
- Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE (Q3457134) (← links)
- Finding Preimages in Full MD5 Faster Than Exhaustive Search (Q3627432) (← links)
- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others (Q3634495) (← links)
- Two Passes of Tiger Are Not One-Way (Q3637130) (← links)
- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5 (Q3644196) (← links)
- Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework (Q6048704) (← links)
- Improved attacks against reduced-round Whirlwind (Q6063133) (← links)