A (Second) Preimage Attack on the GOST Hash Function
From MaRDI portal
Publication:3525675
DOI10.1007/978-3-540-71039-4_14zbMath1154.68406OpenAlexW1797949276MaRDI QIDQ3525675
Florian Mendel, Norbert Pramstaller, Christian Rechberger
Publication date: 18 September 2008
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-71039-4_14
Related Items (11)
Cryptanalysis of the Round-Reduced GOST Hash Function ⋮ Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD ⋮ Impossible Differential Properties of Reduced Round Streebog ⋮ Practical-time related-key attack on GOST with secret S-boxes ⋮ A single-key attack on the full GOST block cipher ⋮ Integral distinguishers for reduced-round Stribog ⋮ A Single-Key Attack on the Full GOST Block Cipher ⋮ Cryptanalysis of MD2 ⋮ Cryptanalysis of the GOST Hash Function ⋮ Некоторые методы анализа функций хэширования и их применение к алгоритму ГОСТ Р 34.11-94 ⋮ Distinguisher on full-round compression function of GOST R
Cites Work
- Unnamed Item
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- Cryptanalysis of the Full HAVAL with 4 and 5 Passes
- A Study of the MD5 Attacks: Insights and Improvements
- Advances in Cryptology – CRYPTO 2004
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- How to Break MD5 and Other Hash Functions
- Second Preimages for SMASH
- Finding Collisions in the Full SHA-1
- Finding SHA-1 Characteristics: General Results and Applications
- Fast Software Encryption
- Fast Software Encryption
This page was built for publication: A (Second) Preimage Attack on the GOST Hash Function