Sciweavers

3 search results - page 1 / 1
» Collisions and Near-Collisions for Reduced-Round Tiger
Sort
View
FSE
2006
Springer
159views Cryptology» more  FSE 2006»
13 years 8 months ago
Collisions and Near-Collisions for Reduced-Round Tiger
We describe a collision-finding attack on 16 rounds of the Tiger hash function requiring the time for about 244 compression function invocations. Another attack generates pseudo-ne...
John Kelsey, Stefan Lucks
CANS
2010
Springer
197views Cryptology» more  CANS 2010»
13 years 3 months ago
Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE
The SHA-3 competition organized by NIST [1] aims to find a new hash standard as a replacement of SHA-2. Till now, 14 submissions have been selected as the second round candidates, ...
Bozhan Su, Wenling Wu, Shuang Wu, Le Dong
WEWORC
2007
148views Cryptology» more  WEWORC 2007»
13 years 6 months ago
Preimages for Reduced-Round Tiger
The cryptanalysis of the cryptographic hash function Tiger has, until now, focussed on finding collisions. In this paper we describe a preimage attack on the compression function ...
Sebastiaan Indesteege, Bart Preneel