RIPEMD with two-round compress function is not collision-free
From MaRDI portal
Recommendations
Cites work
Cited in
(17)- The RIPEMDL and RIPEMDR Improved Variants of MD4 Are Not Collision Free
- Keyed/Unkeyed RIPEMD-128, 192, 256
- RIPEMD-160: a strengthened version of RIPEMD
- Simple hash function using discrete-time quantum walks
- Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160
- Hash function based on quantum walks
- Practical collision attack on 40-step RIPEMD-128
- New Constructions for Secure Hash Functions
- Cryptanalysis of MD4
- Collision attacks on the reduced dual-stream hash function RIPEMD-128
- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others
- A quantum hash function with grouped coarse-grained boson sampling
- The first two rounds of MD4 are not one-way
- Cryptanalysis of full \texttt{RIPEMD-128}
- Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD
- The collision attack on the last three rounds of RIPEMD-128
- scientific article; zbMATH DE number 1394313 (Why is no real title available?)
This page was built for publication: RIPEMD with two-round compress function is not collision-free
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q676830)