Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
From MaRDI portal
Publication:3399202
Recommendations
Cites work
- scientific article; zbMATH DE number 1689008 (Why is no real title available?)
- scientific article; zbMATH DE number 1024001 (Why is no real title available?)
- scientific article; zbMATH DE number 954401 (Why is no real title available?)
- A Failure-Friendly Design Principle for Hash Functions
- An attack on hash function HAVAL-128
- Cryptanalysis of 3-pass HAVAL
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- How to Break MD5 and Other Hash Functions
- Improved Indifferentiability Security Analysis of chopMD Hash Function
- MD4 is Not One-Way
- Merkle-Damgård Revisited: How to Construct a Hash Function
- Preimage Attacks on 3, 4, and 5-Pass HAVAL
- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Preimage Attacks on Reduced Tiger and SHA-2
- Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL
- Strengthening Digital Signatures Via Randomized Hashing
- Weaknesses in the HAS-V Compression Function
Cited in
(3)
This page was built for publication: Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3399202)