Preimage Attacks on One-Block MD4, 63-Step MD5 and More

From MaRDI portal
Publication:3644195

DOI10.1007/978-3-642-04159-4_7zbMath1256.94040OpenAlexW1814882979MaRDI QIDQ3644195

Yu Sasaki, Kazumaro Aoki

Publication date: 3 November 2009

Published in: Selected Areas in Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-04159-4_7




Related Items (32)

Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVALMeet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementationsCryptanalysis of the Round-Reduced GOST Hash FunctionAll Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle ApproachNew Attacks on Feistel Structures with Improved Memory ComplexitiesHigher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKECollision attack on the full extended MD4 and pseudo-preimage attack on RIPEMDKey recovery attacks on iterated Even-Mansour encryption schemesCryptanalysis of Reduced-Round WhirlwindBicliques with Minimal Data and Time Complexity for AESA Framework for Automated Independent-Biclique CryptanalysisMeet-in-the-middle attack with splice-and-cut technique and a general automatic frameworkImproved attacks against reduced-round WhirlwindMeet-in-the-middle preimage attacks on sponge-based hashingSuperposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashingMind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}Differential meet-in-the-middle cryptanalysisSimplified MITM modeling for permutations: new (quantum) attacksA single-key attack on the full GOST block cipherCollisions of MMO-MD5 and Their Impact on Original MD5A Single-Key Attack on the Full GOST Block CipherMeet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision ApproachMeet-in-the-Middle Attacks on Reduced-Round XTEAFinding Preimages in Full MD5 Faster Than Exhaustive SearchMeet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and OthersAutomatic search of meet-in-the-middle preimage attacks on AES-like hashingTwo Passes of Tiger Are Not One-WayPreimage Attacks on 3-Pass HAVAL and Step-Reduced MD5Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVALNew attacks on IDEA with at least 6 rounds



Cites Work


This page was built for publication: Preimage Attacks on One-Block MD4, 63-Step MD5 and More