Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
From MaRDI portal
Publication:3058649
DOI10.1007/978-3-642-17373-8_4zbMath1253.94051OpenAlexW1566855226WikidataQ56566611 ScholiaQ56566611MaRDI QIDQ3058649
Christian Rechberger, Huaxiong Wang, San Ling, Jian Guo
Publication date: 7 December 2010
Published in: Advances in Cryptology - ASIACRYPT 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-17373-8_4
Related Items (19)
Quantum collision attacks on reduced SHA-256 and SHA-512 ⋮ Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL ⋮ Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks ⋮ Extended meet-in-the-middle attacks on some Feistel constructions ⋮ Boomerang Attack on Step-Reduced SHA-512 ⋮ All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach ⋮ Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD ⋮ Bicliques with Minimal Data and Time Complexity for AES ⋮ Meet-in-the-middle preimage attacks on sponge-based hashing ⋮ Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing ⋮ Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak ⋮ Differential meet-in-the-middle cryptanalysis ⋮ Simplified MITM modeling for permutations: new (quantum) attacks ⋮ An improved preimage attack against \texttt{HAVAL-3} ⋮ Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool ⋮ Block cipher invariants as eigenvectors of correlation matrices ⋮ (Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach ⋮ A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN ⋮ Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
This page was built for publication: Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2