The RIPEMDL and RIPEMDR Improved Variants of MD4 Are Not Collision Free
From MaRDI portal
Publication:3046589
DOI10.1007/3-540-45473-X_5zbMATH Open1073.68624OpenAlexW1517650281MaRDI QIDQ3046589FDOQ3046589
Authors: Christophe Debaert, Henri Gilbert
Publication date: 12 August 2004
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-45473-x_5
Recommendations
Cited In (8)
- Cryptanalysis of MD4
- On the Collision Resistance of RIPEMD-160
- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others
- Keyed/Unkeyed RIPEMD-128, 192, 256
- Title not available (Why is that?)
- Practical collision attack on 40-step RIPEMD-128
- Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD
- RIPEMD-160: a strengthened version of RIPEMD
This page was built for publication: The RIPEMDL and RIPEMDR Improved Variants of MD4 Are Not Collision Free
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3046589)