Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL
From MaRDI portal
Publication:3525673
DOI10.1007/978-3-540-71039-4_12zbMATH Open1154.68398OpenAlexW1736627613MaRDI QIDQ3525673FDOQ3525673
Authors: Eunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong
Publication date: 18 September 2008
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-71039-4_12
Recommendations
Cites Work
- Title not available (Why is that?)
- Finding Collisions in the Full SHA-1
- Title not available (Why is that?)
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- How to Break MD5 and Other Hash Functions
- Efficient Collision Search Attacks on SHA-0
- Cryptanalysis of 3-pass HAVAL
- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)
- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
- Advances in Cryptology – CRYPTO 2004
- Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
- Cryptanalysis of the Full HAVAL with 4 and 5 Passes
- Cryptology and Network Security
Cited In (7)
- Title not available (Why is that?)
- Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL
- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
- Preimage Attacks on 3, 4, and 5-Pass HAVAL
- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
- Security in Communication Networks
- An improved preimage attack against \texttt{HAVAL-3}
Uses Software
This page was built for publication: Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3525673)