Sciweavers

4 search results - page 1 / 1
» Preimages for Reduced-Round Tiger
Sort
View
WEWORC
2007
148views Cryptology» more  WEWORC 2007»
13 years 6 months ago
Preimages for Reduced-Round Tiger
The cryptanalysis of the cryptographic hash function Tiger has, until now, focussed on finding collisions. In this paper we describe a preimage attack on the compression function ...
Sebastiaan Indesteege, Bart Preneel
FSE
2006
Springer
159views Cryptology» more  FSE 2006»
13 years 8 months ago
Collisions and Near-Collisions for Reduced-Round Tiger
We describe a collision-finding attack on 16 rounds of the Tiger hash function requiring the time for about 244 compression function invocations. Another attack generates pseudo-ne...
John Kelsey, Stefan Lucks
ASIACRYPT
2010
Springer
13 years 2 months ago
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
We revisit narrow-pipe designs that are in practical use, and their security against preimage attacks. Our results are the best known preimage attacks on Tiger, MD4, and reduced SH...
Jian Guo, San Ling, Christian Rechberger, Huaxiong...
FSE
2010
Springer
153views Cryptology» more  FSE 2010»
13 years 9 months ago
Finding Preimages of Tiger Up to 23 Steps
Lei Wang, Yu Sasaki