Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function
From MaRDI portal
Publication:3506389
DOI10.1007/978-3-540-68164-9_20zbMath1142.94359OpenAlexW1507214842MaRDI QIDQ3506389
Lei Wang, Kazuo Ohta, Noboru Kunihiro, Yu Sasaki
Publication date: 13 June 2008
Published in: Progress in Cryptology – AFRICACRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-68164-9_20
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- On the Security of Two MAC Algorithms
- Message Freedom in MD4 and MD5 Collisions: Application to APOP
- Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- How to Break MD5 and Other Hash Functions
- Efficient Collision Search Attacks on SHA-0
- Finding Collisions in the Full SHA-1
- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
This page was built for publication: Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function