Sciweavers

54 search results - page 1 / 11
» Second Preimage Attacks on Dithered Hash Functions
Sort
View
EUROCRYPT
2008
Springer
13 years 6 months ago
Second Preimage Attacks on Dithered Hash Functions
Abstract. We develop a new generic long-message second preimage attack, based on combining the techniques in the second preimage attacks of Dean [8] and Kelsey and Schneier [16] wi...
Elena Andreeva, Charles Bouillaguet, Pierre-Alain ...
INDOCRYPT
2009
Springer
13 years 11 months ago
Second Preimage Attack on SHAMATA-512
We present a second preimage attack on SHAMATA-512, which is a hash function of 512bit output and one of the first round candidates of the SHA-3 competition. The attack uses di...
Kota Ideguchi, Dai Watanabe
WEWORC
2007
148views Cryptology» more  WEWORC 2007»
13 years 5 months ago
Preimages for Reduced-Round Tiger
The cryptanalysis of the cryptographic hash function Tiger has, until now, focussed on finding collisions. In this paper we describe a preimage attack on the compression function ...
Sebastiaan Indesteege, Bart Preneel
ACISP
2010
Springer
13 years 2 months ago
Second-Preimage Analysis of Reduced SHA-1
Many applications using cryptographic hash functions do not require collision resistance, but some kind of preimage resistance. That's also the reason why the widely used SHA-...
Christian Rechberger
CANS
2005
Springer
120views Cryptology» more  CANS 2005»
13 years 10 months ago
The Second-Preimage Attack on MD4
In Eurocrypt’05, Wang et al. presented new techniques to find collisions of Hash function MD4. The techniques are not only efficient to search for collisions, but also applicabl...
Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang