Cryptanalysis of MD4
From MaRDI portal
Publication:1281786
DOI10.1007/S001459900047zbMath0972.94033OpenAlexW2090135172MaRDI QIDQ1281786
Publication date: 22 November 2001
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s001459900047
Related Items (19)
Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis ⋮ Fast Hashing on the Pentium ⋮ Extracts from the SHA-3 Competition ⋮ Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD ⋮ A structure-based chaotic hashing scheme ⋮ Security analysis of randomize-hash-then-sign digital signatures ⋮ MD4 is Not One-Way ⋮ The NIST SHA-3 Competition: A Perspective on the Final Year ⋮ Constructing quantum hash functions based on quantum walks on Johnson graphs ⋮ Simple hash function using discrete-time quantum walks ⋮ Cryptanalysis of SHA-0 and reduced SHA-1 ⋮ Multicollision attacks and generalized iterated hash functions ⋮ Optimal Covering Codes for Finding Near-Collisions ⋮ Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256 ⋮ Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others ⋮ Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques ⋮ A combinatorial analysis of recent attacks on step reduced SHA-2 family ⋮ Applications of SAT Solvers in Cryptanalysis: Finding Weak Keys and Preimages ⋮ The rebound attack and subspace distinguishers: application to Whirlpool
This page was built for publication: Cryptanalysis of MD4