Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
From MaRDI portal
Publication:3399202
DOI10.1007/978-3-642-04474-8_7zbMath1307.94093OpenAlexW1489460329MaRDI QIDQ3399202
Publication date: 29 September 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-04474-8_7
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- An attack on hash function HAVAL-128
- Preimage Attacks on Reduced Tiger and SHA-2
- Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL
- MD4 is Not One-Way
- Improved Indifferentiability Security Analysis of chopMD Hash Function
- Preimage Attacks on 3, 4, and 5-Pass HAVAL
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
- Weaknesses in the HAS-V Compression Function
- How to Break MD5 and Other Hash Functions
- Merkle-Damgård Revisited: How to Construct a Hash Function
- A Failure-Friendly Design Principle for Hash Functions
- Strengthening Digital Signatures Via Randomized Hashing
- Advances in Cryptology - ASIACRYPT 2003
This page was built for publication: Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL