Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work

From MaRDI portal
Publication:5385746

DOI10.1007/11426639_28zbMath1137.94350OpenAlexW1533007301WikidataQ27980393 ScholiaQ27980393MaRDI QIDQ5385746

John Kelsey, Bruce Schneier

Publication date: 6 May 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11426639_28




Related Items (46)

Improved indifferentiability security bound for the JH modeIndifferentiability security of the fast wide pipe hash: breaking the birthday barrierProvable Security of BLAKE with Non-ideal Compression FunctionNew second-preimage attacks on hash functionsDifferential property of \textsc{Present}-like structureSecurity analysis of randomize-hash-then-sign digital signaturesOpen problems in hash function securityCryptanalysis of GrindahlGeneric attacks on hash combinersImproved generic attacks against hash-based MACs and HAIFAHow (Not) to Efficiently Dither Blockcipher-Based Hash Functions?Nostradamus goes quantumCollision attack on \({\mathtt Grindahl}\)On the complexity of the herding attack and some related attacks on hash functionsBreaking category five \(\mathrm{SPHINCS}^+\) with SHA-256New second preimage attacks on dithered hash functions with low memory complexityOn the Strength of the Concatenated Hash Combiner When All the Hash Functions Are WeakMD4 is Not One-WayA new black box analysis of hash functions based on block ciphersCollisions for RC4-HashLinear Analysis of Reduced-Round CubeHashAn Improved Algebraic Attack on Hamsi-256Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to WhirlpoolFast correlation attack on stream cipher ABC v3Herding Hash Functions and the Nostradamus AttackSlide Attacks on a Class of Hash FunctionsHow to Fill Up Merkle-Damgård Hash FunctionsBuilding indifferentiable compression functions from the PGV compression functionsНекоторые методы анализа функций хэширования и их применение к алгоритму ГОСТ Р 34.11-94(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision ApproachLinear-XOR and Additive Checksums Don’t Protect Damgård-Merkle Hashes from Generic AttacksOn Randomizing Hash Functions to Strengthen the Security of Digital SignaturesCryptanalysis of MDC-2Finding Preimages in Full MD5 Faster Than Exhaustive SearchA Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday BarrierThe Latin squares and the secret sharing schemesCharacterizing Padding Rules of MD Hash Functions Preserving Collision SecurityOn the Weak Ideal Compression FunctionsPreimage Attacks on One-Block MD4, 63-Step MD5 and MoreA Three-Property-Secure Hash FunctionMemory-Efficient Algorithms for Finding Needles in HaystacksIncreasing the flexibility of the herding attackNew records of pre-image search of reduced SHA-1 using SAT solversHash Functions and RFID Tags: Mind the GapFaster MulticollisionsHow to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash Functions




This page was built for publication: Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work