Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
From MaRDI portal
Publication:3399202
DOI10.1007/978-3-642-04474-8_7zbMATH Open1307.94093OpenAlexW1489460329MaRDI QIDQ3399202FDOQ3399202
Authors: Yu Sasaki
Publication date: 29 September 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-04474-8_7
Recommendations
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Merkle-Damgård Revisited: How to Construct a Hash Function
- Strengthening Digital Signatures Via Randomized Hashing
- Improved Indifferentiability Security Analysis of chopMD Hash Function
- A Failure-Friendly Design Principle for Hash Functions
- MD4 is Not One-Way
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- How to Break MD5 and Other Hash Functions
- Cryptanalysis of 3-pass HAVAL
- An attack on hash function HAVAL-128
- Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL
- Preimage Attacks on 3, 4, and 5-Pass HAVAL
- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
- Preimage Attacks on Reduced Tiger and SHA-2
- Weaknesses in the HAS-V Compression Function
- Title not available (Why is that?)
Cited In (3)
Uses Software
This page was built for publication: Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3399202)