An improved preimage attack against \texttt{HAVAL-3}
From MaRDI portal
Publication:477698
DOI10.1016/J.IPL.2014.10.016zbMATH Open1320.94065OpenAlexW2074998919MaRDI QIDQ477698FDOQ477698
Chun-hua Su, Jian Guo, Wun-She Yap
Publication date: 9 December 2014
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2014.10.016
Recommendations
- Preimage Attacks on 3, 4, and 5-Pass HAVAL
- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
- A preimage attack on reduced \textsc{Gimli}-\textsc{Gash}
- Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL
- Preimage attacks against PKC98-Hash and HAS-V
- Preimage Attacks on Step-Reduced SM3 Hash Function
- Preimage attacks on reduced-round Stribog
- Preimage attack on reduced DHA-256
Cites Work
- Title not available (Why is that?)
- Fast software encryption. 16th international workshop, FSE 2009, Leuven, Belgium, February 22--25, 2009. Revised selected papers
- (Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach
- MD4 is Not One-Way
- Preimages for Reduced SHA-0 and SHA-1
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others
- Title not available (Why is that?)
- Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster)
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
- Advances in cryptology -- EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26--30, 2009. Proceedings
- Cryptanalysis of HMAC/NMAC-Whirlpool
- New Preimage Attacks against Reduced SHA-1
- Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- Meet-in-the-Middle Attacks on Reduced-Round XTEA
- New Birthday Attacks on Some MACs Based on Block Ciphers
- Meet-in-the-Middle Attacks on SHA-3 Candidates
- New Distinguishing Attack on MAC Using Secret-Prefix Method
- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
- A Meet-in-the-Middle Attack on 8-Round AES
- Title not available (Why is that?)
- Preimage Attacks on 3, 4, and 5-Pass HAVAL
- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
- Preimages for step-reduced SHA-2
- Improved Meet-in-the-Middle Attacks on Reduced-Round DES
- Selected Areas in Cryptography
- Topics in cryptology -- CT-RSA 2011. The cryptographers' track at the RSA conference 2011, San Francisco, CA, USA, February 14--18, 2011. Proceedings
- Advances in cryptology -- CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16--20, 2009. Proceedings
- Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10--13, 2008. Revised selected papers
Cited In (3)
Uses Software
This page was built for publication: An improved preimage attack against \texttt{HAVAL-3}
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q477698)