Preimage Attacks on Step-Reduced MD5
From MaRDI portal
Publication:3511170
DOI10.1007/978-3-540-70500-0_21zbMath1285.94094OpenAlexW1503774814MaRDI QIDQ3511170
Publication date: 8 July 2008
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-70500-0_21
Related Items (7)
A Framework for Automated Independent-Biclique Cryptanalysis ⋮ Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing ⋮ Collisions of MMO-MD5 and Their Impact on Original MD5 ⋮ Finding Preimages in Full MD5 Faster Than Exhaustive Search ⋮ Automatic search of meet-in-the-middle preimage attacks on AES-like hashing ⋮ Preimage Attacks on One-Block MD4, 63-Step MD5 and More ⋮ Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
Cites Work
- Unnamed Item
- Unnamed Item
- Formalizing Human Ignorance
- MD4 is Not One-Way
- Inversion Attacks on Secure Hash Functions Using sat Solvers
- A Study of the MD5 Attacks: Insights and Improvements
- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
- The First Two Rounds of MD4 are Not One-Way
- Advances in Cryptology – CRYPTO 2004
- Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL
- How to Break MD5 and Other Hash Functions
- The MD2 Hash Function Is Not One-Way
- Fast Software Encryption
This page was built for publication: Preimage Attacks on Step-Reduced MD5