The following pages link to HAVAL (Q14700):
Displayed 45 items.
- A new one-bit difference collision attack on HAVAL-128 (Q362172) (← links)
- An improved preimage attack against \texttt{HAVAL-3} (Q477698) (← links)
- Open problems in hash function security (Q887443) (← links)
- Security arguments for digital signatures and blind signatures (Q1573771) (← links)
- Nonlinearity and propagation characteristics of balanced Boolean functions (Q1893724) (← links)
- One-way hash functions with changeable parameters. (Q1961822) (← links)
- Simple hash function using discrete-time quantum walks (Q1993832) (← links)
- A quantum hash function with grouped coarse-grained boson sampling (Q2102295) (← links)
- More permutations and involutions for constructing bent functions (Q2119853) (← links)
- New characterizations and construction methods of bent and hyper-bent Boolean functions (Q2198402) (← links)
- Hash function based on quantum walks (Q2322065) (← links)
- Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD (Q2637303) (← links)
- (Q2707409) (← links)
- (Q2762756) (← links)
- Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL (Q2889860) (← links)
- (Q3046362) (← links)
- Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1 (Q3183557) (← links)
- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL (Q3399202) (← links)
- Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL (Q3525673) (← links)
- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract) (Q3541891) (← links)
- (Q3562880) (← links)
- Preimage Attacks on 3, 4, and 5-Pass HAVAL (Q3600379) (← links)
- Cryptanalysis of the Full HAVAL with 4 and 5 Passes (Q3618646) (← links)
- A New Dedicated 256-Bit Hash Function: FORK-256 (Q3618654) (← links)
- Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL (Q3637128) (← links)
- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5 (Q3644196) (← links)
- (Q3840096) (← links)
- (Q3840099) (← links)
- (Q4263441) (← links)
- (Q4341676) (← links)
- (Q4412959) (← links)
- (Q4412996) (← links)
- (Q4413861) (← links)
- (Q4428362) (← links)
- (Q4470586) (← links)
- Design principles for dedicated hash functions (Q4499397) (← links)
- (Q4502734) (← links)
- (Q4520278) (← links)
- (Q4520506) (← links)
- Cryptanalysis of the Hash Functions MD4 and RIPEMD (Q5385717) (← links)
- How to Break MD5 and Other Hash Functions (Q5385718) (← links)
- Information and Communications Security (Q5393999) (← links)
- RC4-Hash: A New Hash Function Based on RC4 (Q5458267) (← links)
- Security in Communication Networks (Q5491708) (← links)
- Coding and Cryptography (Q5899185) (← links)