MD4 is Not One-Way
From MaRDI portal
Publication:3525692
DOI10.1007/978-3-540-71039-4_26zbMath1154.68400OpenAlexW1499593564MaRDI QIDQ3525692
Publication date: 18 September 2008
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-71039-4_26
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Theory of software (68N99)
Related Items (24)
Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL ⋮ Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD ⋮ New second-preimage attacks on hash functions ⋮ Security analysis of randomize-hash-then-sign digital signatures ⋮ Meet-in-the-middle preimage attacks on sponge-based hashing ⋮ Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing ⋮ Preimage Attacks on Step-Reduced MD5 ⋮ An improved preimage attack against \texttt{HAVAL-3} ⋮ An Improved Algebraic Attack on Hamsi-256 ⋮ Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool ⋮ Preimage Attacks on 3, 4, and 5-Pass HAVAL ⋮ How to Fill Up Merkle-Damgård Hash Functions ⋮ (Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach ⋮ MJH: A Faster Alternative to MDC-2 ⋮ Unnamed Item ⋮ Cryptanalysis of MDC-2 ⋮ Finding Preimages in Full MD5 Faster Than Exhaustive Search ⋮ Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others ⋮ Automatic search of meet-in-the-middle preimage attacks on AES-like hashing ⋮ Two Passes of Tiger Are Not One-Way ⋮ Preimage Attacks on One-Block MD4, 63-Step MD5 and More ⋮ Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5 ⋮ Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL ⋮ Applications of SAT Solvers in Cryptanalysis: Finding Weak Keys and Preimages
Cites Work
- Unnamed Item
- Unnamed Item
- Advances in cryptology -- EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22--26, 2005. Proceedings
- Cryptanalysis of MD4
- Formalizing Human Ignorance
- New Message Difference for MD4
- Inversion Attacks on Secure Hash Functions Using sat Solvers
- On the need for multipermutations: Cryptanalysis of MD4 and SAFER
- The First Two Rounds of MD4 are Not One-Way
- Weaknesses in the HAS-V Compression Function
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- How to Break MD5 and Other Hash Functions
- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
- Finding Collisions in the Full SHA-1
- The MD2 Hash Function Is Not One-Way
- Fast Software Encryption
- Fast Software Encryption
- Cryptology and Network Security
This page was built for publication: MD4 is Not One-Way