Cryptanalysis of MD4
From MaRDI portal
Publication:4593784
DOI10.1007/3-540-60865-6_43zbMATH Open1373.94913OpenAlexW1542068190MaRDI QIDQ4593784FDOQ4593784
Authors: Hans Dobbertin
Publication date: 15 November 2017
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-60865-6_43
Recommendations
Cited In (27)
- New Constructions for Secure Hash Functions
- A quantum hash function with grouped coarse-grained boson sampling
- Simple hash function using discrete-time quantum walks
- Cryptanalysis of MD2
- The first two rounds of MD4 are not one-way
- Practical Collisions for EnRUPT
- MD4 is Not One-Way
- Information and Communications Security
- Practical free-start collision attacks on 76-step SHA-1
- One-way hash function based on delay-induced hyperchaos
- Cryptanalysis of MD4
- Information Security and Cryptology - ICISC 2005
- Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography
- Cryptanalysis of MDC-2
- Title not available (Why is that?)
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- How to Break MD5 and Other Hash Functions
- Security analysis of randomize-hash-then-sign digital signatures
- RIPEMD with two-round compress function is not collision-free
- A combinatorial analysis of recent attacks on step reduced SHA-2 family
- New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru
- On the need for multipermutations: Cryptanalysis of MD4 and SAFER
- One-way hash functions with changeable parameters.
- RIPEMD-160: a strengthened version of RIPEMD
- JERIM-320: a 320-bit hash function with dual applications -- a statistical analysis
- Cryptanalysis of hash functions on the MD4-family.
- The RIPEMDL and RIPEMDR Improved Variants of MD4 Are Not Collision Free
This page was built for publication: Cryptanalysis of MD4
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4593784)