Preimage Attacks on 3, 4, and 5-Pass HAVAL
From MaRDI portal
Publication:3600379
DOI10.1007/978-3-540-89255-7_16zbMath1206.94089OpenAlexW1568906052MaRDI QIDQ3600379
Publication date: 10 February 2009
Published in: Advances in Cryptology - ASIACRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-89255-7_16
Related Items (12)
Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL ⋮ Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks ⋮ Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD ⋮ Improved attacks against reduced-round Whirlwind ⋮ Meet-in-the-middle preimage attacks on sponge-based hashing ⋮ Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing ⋮ An improved preimage attack against \texttt{HAVAL-3} ⋮ Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool ⋮ Finding Preimages in Full MD5 Faster Than Exhaustive Search ⋮ Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others ⋮ Automatic search of meet-in-the-middle preimage attacks on AES-like hashing ⋮ Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- An attack on hash function HAVAL-128
- Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL
- MD4 is Not One-Way
- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)
- Preimages for Reduced SHA-0 and SHA-1
- Cryptanalysis of the Full HAVAL with 4 and 5 Passes
- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
- The First Two Rounds of MD4 are Not One-Way
- How to Break MD5 and Other Hash Functions
- Information and Communications Security
- Security in Communication Networks
- Advances in Cryptology - ASIACRYPT 2003
This page was built for publication: Preimage Attacks on 3, 4, and 5-Pass HAVAL