Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
From MaRDI portal
Publication:4899710
DOI10.1007/978-3-642-34047-5_16zbMath1282.94054OpenAlexW169385793MaRDI QIDQ4899710
Kyoji Shibutani, Ji Li, Takanori Isobe
Publication date: 8 January 2013
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-34047-5_16
hash functionSHA-2meet-in-the-middle attackSkeinBLAKEpreimage attacknarrow-pipepseudo collision attack
Related Items (8)
Quantum collision attacks on reduced SHA-256 and SHA-512 ⋮ Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks ⋮ Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique ⋮ Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD ⋮ New criterion for diffusion property and applications to improved GFS and EGFN ⋮ Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing ⋮ Rotational rebound attacks on reduced Skein ⋮ Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
This page was built for publication: Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2