Mathematical Research Data Initiative
Main page
Recent changes
Random page
SPARQL
MaRDI@GitHub
New item
Special pages
In other projects
MaRDI portal item
Discussion
View source
View history
English
Log in

Finding preimages of Tiger up to 23 steps

From MaRDI portal
Publication:3577955
Jump to:navigation, search

DOI10.1007/978-3-642-13858-4_7zbMATH Open1285.94100OpenAlexW2107286688MaRDI QIDQ3577955FDOQ3577955


Authors: Lei Wang, Yu Sasaki Edit this on Wikidata


Publication date: 13 July 2010

Published in: Fast Software Encryption (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-13858-4_7




Recommendations

  • Preimages for Reduced-Round Tiger
  • Preimage Attacks on Reduced Tiger and SHA-2
  • Two Passes of Tiger Are Not One-Way
  • Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
  • Cryptanalysis of the Tiger Hash Function


zbMATH Keywords

hash functionmeet-in-the-middlepreimage attackTigerindependent chunks


Mathematics Subject Classification ID

Data encryption (aspects in computer science) (68P25) Cryptography (94A60)



Cited In (5)

  • Two Passes of Tiger Are Not One-Way
  • New attacks on Feistel structures with improved memory complexities
  • Preimages for Reduced-Round Tiger
  • Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
  • Automatic search of meet-in-the-middle preimage attacks on AES-like hashing





This page was built for publication: Finding preimages of Tiger up to 23 steps

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3577955)

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:3577955&oldid=16981606"
Tools
What links here
Related changes
Printable version
Permanent link
Page information
This page was last edited on 5 February 2024, at 02:40. Warning: Page may not contain recent updates.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki