RIPEMD-160: a strengthened version of RIPEMD
From MaRDI portal
Publication:4593785
DOI10.1007/3-540-60865-6_44zbMATH Open1373.94914OpenAlexW2104633167MaRDI QIDQ4593785FDOQ4593785
Authors: Hans Dobbertin, Antoon Bosselaers, Bart Preneel
Publication date: 15 November 2017
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://lirias.kuleuven.be/handle/123456789/234118
Recommendations
Cited In (30)
- New Constructions for Secure Hash Functions
- Re-keying algorithms for symmetric cryptosystems
- Fast hashing on the Pentium
- New proofs for NMAC and HMAC: security without collision resistance
- Hardened bloom filters, with an application to unobservability
- The NIST SHA-3 Competition: A Perspective on the Final Year
- On the Collision Resistance of RIPEMD-160
- Fast hashing and stream encryption with \textsc{Panama}
- The Hash Function Family LAKE
- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others
- On the security of some variants of the RSA signature scheme
- Automated key recovery attacks on round-reduced Orthros
- Title not available (Why is that?)
- Post-quantum cryptography: state of the art
- Cryptanalysis of SHA-0 and reduced SHA-1
- Keyed/Unkeyed RIPEMD-128, 192, 256
- On the existence of statistically hiding bit commitment schemes and fail-stop signatures
- Collision resistant double-length hashing
- Cryptanalysis of full \texttt{RIPEMD-128}
- An efficient approach for secure multi-party computation without authenticated channel
- Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP
- On the hardware implementation of RIPEMD processor: networking high speed hashing, up to 2 Gbps
- Revisiting structure graphs: applications to CBC-MAC and EMAC
- Open problems in hash function security
- Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160
- Three-party authenticated lightweight quantum key distribution without pre-shared key between participants
- (Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach
- One-way hash functions with changeable parameters.
- Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD
- JERIM-320: a 320-bit hash function with dual applications -- a statistical analysis
This page was built for publication: RIPEMD-160: a strengthened version of RIPEMD
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4593785)