Results 161 to 170 of about 4,920 (187)

(Inner-Product) Functional Encryption with Updatable Ciphertexts. [PDF]

open access: yesJ Cryptol
Cini V   +4 more
europepmc   +1 more source

Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5.

open access: green, 2008
Jean-Philippe Aumasson   +2 more
openalex   +1 more source

Preimage Attack on Hash Function RIPEMD

Journal of Computer Science and Technology, 2009
RIPEMD is a cryptographic hash function devised in the framework of the RIPE project (RACE Integrity Primitives Evaluation, 1988-1992). It consists of two parallel lines, and each line is identical to MD4 except for some internal constants. It has been broken by the collision attack, but no preimage attack was given.
Gaoli Wang, Shaohui Wang
openaire   +3 more sources

Preimage Attacks against Variants of Very Smooth Hash

2010
In this paper, we show that some new variants of the Very Smooth Hash (VSH) hash function are susceptible to similar types of preimage attacks as the original VSH. We also generalise the previous mathematical results, which have been used in the preimage attacks. VSH is a hash function based on the multiexponentiation of prime numbers modulo some large
Röning Juha, Halunen Kimmo
openaire   +1 more source

Inverse operation and preimage attack on BioHashing

2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications, 2009
BioHashing generates a BioCode from a user's biometric features by projecting them onto user-specific random vectors and then discritizes the projection coefficients into zero or one. Since biometric features are distorted by the non-invertible transforms and template matching is performed in a transformed state, it has been claimed that BioHashing is ...
null Yongjin Lee   +2 more
openaire   +1 more source

Improved Preimage Attacks against Reduced HAS-160

2014
HAS-160 is a Korean industry standard for hash functions. It has a similar structure to SHA-1 and produces a 160-bit hash value. In this paper, we propose improved preimage attacks against step-reduced HAS-160 using the differential meet-in-the-middle technique and initial structure.
Ronglin Hao   +3 more
  +4 more sources

Preimage Attacks on Step-Reduced MD5

2008
In this paper, we propose preimage attacks on step-reduced MD5. We show that a preimage of a 44-step MD5 can be computed to a complexity of 296. We also consider a preimage attack against variants of MD5 where the round order is modified from the real MD5.
Yu Sasaki, Kazumaro Aoki
openaire   +1 more source

Home - About - Disclaimer - Privacy