Preimages for Step-Reduced SHA-2
From MaRDI portal
Publication:3650715
DOI10.1007/978-3-642-10366-7_34zbMath1267.94030OpenAlexW1596861772WikidataQ56566610 ScholiaQ56566610MaRDI QIDQ3650715
Yu Sasaki, Jian Guo, Kazumaro Aoki, Krystian Matusiewicz, Lei Wang
Publication date: 15 December 2009
Published in: Advances in Cryptology – ASIACRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-10366-7_34
Related Items (15)
Quantum collision attacks on reduced SHA-256 and SHA-512 ⋮ Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks ⋮ Extended meet-in-the-middle attacks on some Feistel constructions ⋮ Boomerang Attack on Step-Reduced SHA-512 ⋮ All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach ⋮ Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD ⋮ Cryptanalysis of Reduced-Round Whirlwind ⋮ Quantum meet-in-the-middle attack on Feistel construction ⋮ Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak ⋮ An improved preimage attack against \texttt{HAVAL-3} ⋮ Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool ⋮ (Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach ⋮ Meet-in-the-Middle Attacks on Reduced-Round XTEA ⋮ Automatic search of meet-in-the-middle preimage attacks on AES-like hashing ⋮ Secure hash algorithm-2 formed on DNA
This page was built for publication: Preimages for Step-Reduced SHA-2