Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
From MaRDI portal
Publication:3183557
DOI10.1007/978-3-642-03356-8_5zbMath1252.94043OpenAlexW1550036077MaRDI QIDQ3183557
Publication date: 20 October 2009
Published in: Advances in Cryptology - CRYPTO 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-03356-8_5
Related Items (18)
Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks ⋮ Cryptanalysis of the Round-Reduced GOST Hash Function ⋮ All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach ⋮ Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE ⋮ Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD ⋮ Refined cryptanalysis of the GPRS ciphers GEA-1 and GEA-2 ⋮ Bicliques with Minimal Data and Time Complexity for AES ⋮ Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework ⋮ Generalized MitM attacks on full TWINE ⋮ Differential meet-in-the-middle cryptanalysis ⋮ Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64 ⋮ An improved preimage attack against \texttt{HAVAL-3} ⋮ A novel keyed parallel hashing scheme based on a new chaotic system ⋮ Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool ⋮ Block cipher invariants as eigenvectors of correlation matrices ⋮ (Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach ⋮ Automatic search of meet-in-the-middle preimage attacks on AES-like hashing ⋮ New records of pre-image search of reduced SHA-1 using SAT solvers
Uses Software
This page was built for publication: Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1