A (Second) Preimage Attack on the GOST Hash Function
From MaRDI portal
Publication:3525675
DOI10.1007/978-3-540-71039-4_14zbMATH Open1154.68406OpenAlexW1797949276MaRDI QIDQ3525675FDOQ3525675
Authors: Florian Mendel, Norbert Pramstaller, Christian Rechberger
Publication date: 18 September 2008
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-71039-4_14
Recommendations
- Cryptanalysis of the GOST Hash Function
- Cryptanalysis of the Round-Reduced GOST Hash Function
- Cryptanalysis of GOST R hash function
- The security of GOST R 34.11-2012 against preimage and collision attacks
- Improved (pseudo) preimage attacks on reduced-round \texttt{GOST} and \texttt{Grøstl-256} and studies on several truncation patterns for \texttt{AES}-like compression functions
Cites Work
- Advances in Cryptology – CRYPTO 2004
- Finding Collisions in the Full SHA-1
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- How to Break MD5 and Other Hash Functions
- Finding SHA-1 Characteristics: General Results and Applications
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- Fast Software Encryption
- Title not available (Why is that?)
- Cryptanalysis of the Full HAVAL with 4 and 5 Passes
- Fast Software Encryption
- A Study of the MD5 Attacks: Insights and Improvements
- Second Preimages for SMASH
Cited In (16)
- Cryptanalysis of the GOST Hash Function
- Cryptanalysis of MD2
- Practical-time related-key attack on GOST with secret S-boxes
- A second pre-image attack and a collision attack to cryptographic hash function lux
- Impossible differential properties of reduced round Streebog
- Some methods of hash functions analysis with application to the GOST P 34.11-94 algorithm
- The usage of counter revisited: second-preimage attack on new Russian standardized hash function
- Second Preimage Attacks on Dithered Hash Functions
- Cryptanalysis of the Round-Reduced GOST Hash Function
- Improved (pseudo) preimage attacks on reduced-round \texttt{GOST} and \texttt{Grøstl-256} and studies on several truncation patterns for \texttt{AES}-like compression functions
- A single-key attack on the full GOST block cipher
- Distinguisher on full-round compression function of GOST R
- Integral distinguishers for reduced-round Stribog
- A single-key attack on the full GOST block cipher
- Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD
- The security of GOST R 34.11-2012 against preimage and collision attacks
This page was built for publication: A (Second) Preimage Attack on the GOST Hash Function
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3525675)