RIPEMD with two-round compress function is not collision-free
From MaRDI portal
Publication:676830
DOI10.1007/S001459900019zbMATH Open0864.94016OpenAlexW2086659222MaRDI QIDQ676830FDOQ676830
Publication date: 30 June 1997
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s001459900019
Recommendations
Cites Work
Cited In (12)
- New Constructions for Secure Hash Functions
- A quantum hash function with grouped coarse-grained boson sampling
- Simple hash function using discrete-time quantum walks
- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others
- Hash function based on quantum walks
- Keyed/Unkeyed RIPEMD-128, 192, 256
- Title not available (Why is that?)
- Cryptanalysis of full \texttt{RIPEMD-128}
- The collision attack on the last three rounds of RIPEMD-128
- Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160
- Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD
- The RIPEMDL and RIPEMDR Improved Variants of MD4 Are Not Collision Free
This page was built for publication: RIPEMD with two-round compress function is not collision-free
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q676830)