Results 181 to 187 of about 4,920 (187)
Some of the next articles are maybe not open access.
Preimage Attacks on Step-Reduced SM3 Hash Function
2012This paper proposes a preimage attack on SM3 hash function reduced to 30 steps. SM3 is an iterated hash function based on the Merkle-Damgard design. It is a hash function used in applications such as the electronic certification service system in China. Our cryptanalysis is based on the Meet-in-the-Middle (MITM) attack.
Jian Zou +4 more
openaire +1 more source
Distinguishing and Second-Preimage Attacks on CBC-Like MACs
2009This paper first presents a new distinguishing attack on the CBC-MAC structure based on block ciphers in cipher block chaining (CBC) mode. This attack detects a CBC-like MAC from random functions. The second result of this paper is a second-preimage attack on the CBC-MAC, which is an extension of the attack of Brincat and Mitchell.
Keting Jia +3 more
openaire +1 more source
Free-starting preimage attacks on BLAKE-32
Journal of Computer Applications, 2010Qiang HE, Ming MAO, Shao-kun ZENG
openaire +1 more source
Preimage attacks on reduced-round Ascon-Xof
Designs, Codes and CryptographySeungjun Baek, Giyoon Kim, Jongsung Kim
openaire +1 more source
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2012
Deukjo HONG, Bonwook KOO, Dong-Chan KIM
openaire +1 more source
Deukjo HONG, Bonwook KOO, Dong-Chan KIM
openaire +1 more source
Preimage attack on step reduced hash function HAVAL
Journal of Computer Applications, 2009openaire +1 more source

