Inversion Attacks on Secure Hash Functions Using sat Solvers
From MaRDI portal
Publication:3612479
DOI10.1007/978-3-540-72788-0_36zbMath1214.68350OpenAlexW172560767WikidataQ60228985 ScholiaQ60228985MaRDI QIDQ3612479
Abishek Kumarasubramanian, Ramarathnam Venkatesan, Debapratim de
Publication date: 10 March 2009
Published in: Theory and Applications of Satisfiability Testing – SAT 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-72788-0_36
Cryptography (94A60) Problem solving in the context of artificial intelligence (heuristics, search strategies, etc.) (68T20)
Related Items (8)
Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD ⋮ Preimage Attacks on Step-Reduced MD5 ⋮ MD4 is Not One-Way ⋮ Unnamed Item ⋮ Finding Preimages in Full MD5 Faster Than Exhaustive Search ⋮ Preimage Attacks on One-Block MD4, 63-Step MD5 and More ⋮ Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5 ⋮ Applications of SAT Solvers in Cryptanalysis: Finding Weak Keys and Preimages
Uses Software
This page was built for publication: Inversion Attacks on Secure Hash Functions Using sat Solvers