Cryptanalysis of the Hash Functions MD4 and RIPEMD

From MaRDI portal
Publication:5385717


DOI10.1007/11426639_1zbMath1137.94358MaRDI QIDQ5385717

Hui Chen, Dengguo Feng, Xiaoyun Wang, Xuejia Lai, Xiu Yuan Yu

Publication date: 6 May 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11426639_1


94A60: Cryptography


Related Items

Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL, Weaknesses in the HAS-V Compression Function, Multi-property Preserving Combiners for Hash Functions, Collisions for 70-Step SHA-1: On the Full Cost of Collision Search, Cryptanalysis of the CRUSH Hash Function, The Delicate Issues of Addition with Respect to XOR Differences, New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5, Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security, How to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash Functions, Survey of information security, One-way hash function construction based on 2D coupled map lattices, Cryptanalysis of Grindahl, Does Secure Time-Stamping Imply Collision-Free Hash Functions?, Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function, Attacking Reduced Round SHA-256, Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography, Collisions for Round-Reduced LAKE, On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak, Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL, A (Second) Preimage Attack on the GOST Hash Function, MD4 is Not One-Way, New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru, Herding Hash Functions and the Nostradamus Attack, Cryptanalysis of the GOST Hash Function, Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures


Uses Software