An improved preimage attack against \texttt{HAVAL-3}
From MaRDI portal
Publication:477698
DOI10.1016/J.IPL.2014.10.016zbMATH Open1320.94065OpenAlexW2074998919MaRDI QIDQ477698FDOQ477698
Authors: Jian Guo, Wun-She Yap, Chun-hua Su
Publication date: 9 December 2014
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2014.10.016
Recommendations
- Preimage Attacks on 3, 4, and 5-Pass HAVAL
- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
- A preimage attack on reduced \textsc{Gimli}-\textsc{Gash}
- Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL
- Preimage attacks against PKC98-Hash and HAS-V
- Preimage Attacks on Step-Reduced SM3 Hash Function
- Preimage attacks on reduced-round Stribog
- Preimage attack on reduced DHA-256
Cites Work
- Title not available (Why is that?)
- Fast software encryption. 16th international workshop, FSE 2009, Leuven, Belgium, February 22--25, 2009. Revised selected papers
- (Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach
- MD4 is Not One-Way
- Preimages for Reduced SHA-0 and SHA-1
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others
- Title not available (Why is that?)
- Improved meet-in-the-middle cryptanalysis of KTANTAN (poster)
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
- Advances in cryptology -- EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26--30, 2009. Proceedings
- Cryptanalysis of HMAC/NMAC-Whirlpool
- New preimage attacks against reduced SHA-1
- Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds
- Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- Meet-in-the-middle attacks on reduced-round XTEA
- New Birthday Attacks on Some MACs Based on Block Ciphers
- Meet-in-the-Middle Attacks on SHA-3 Candidates
- New Distinguishing Attack on MAC Using Secret-Prefix Method
- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
- A Meet-in-the-Middle Attack on 8-Round AES
- Cryptanalysis of hash functions on the MD4-family.
- Preimage Attacks on 3, 4, and 5-Pass HAVAL
- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
- Preimages for step-reduced SHA-2
- Improved Meet-in-the-Middle Attacks on Reduced-Round DES
- Selected Areas in Cryptography
- Topics in cryptology -- CT-RSA 2011. The cryptographers' track at the RSA conference 2011, San Francisco, CA, USA, February 14--18, 2011. Proceedings
- Advances in cryptology -- CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16--20, 2009. Proceedings
- Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10--13, 2008. Revised selected papers
Cited In (7)
- Cryptanalysis of 3-pass HAVAL
- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
- Preimage Attacks on 3, 4, and 5-Pass HAVAL
- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Cryptanalysis of the HaF family of hash functions
- Preimage attacks against PKC98-Hash and HAS-V
Uses Software
This page was built for publication: An improved preimage attack against \texttt{HAVAL-3}
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q477698)