Results 181 to 187 of about 4,920 (187)
Some of the next articles are maybe not open access.

Preimage Attacks on Step-Reduced SM3 Hash Function

2012
This paper proposes a preimage attack on SM3 hash function reduced to 30 steps. SM3 is an iterated hash function based on the Merkle-Damgard design. It is a hash function used in applications such as the electronic certification service system in China. Our cryptanalysis is based on the Meet-in-the-Middle (MITM) attack.
Jian Zou   +4 more
openaire   +1 more source

Distinguishing and Second-Preimage Attacks on CBC-Like MACs

2009
This paper first presents a new distinguishing attack on the CBC-MAC structure based on block ciphers in cipher block chaining (CBC) mode. This attack detects a CBC-like MAC from random functions. The second result of this paper is a second-preimage attack on the CBC-MAC, which is an extension of the attack of Brincat and Mitchell.
Keting Jia   +3 more
openaire   +1 more source

A Preimage Attack on Reduced Gimli-Hash

2022
Yongseong Lee   +3 more
openaire   +1 more source

Free-starting preimage attacks on BLAKE-32

Journal of Computer Applications, 2010
Qiang HE, Ming MAO, Shao-kun ZENG
openaire   +1 more source

Preimage attacks on reduced-round Ascon-Xof

Designs, Codes and Cryptography
Seungjun Baek, Giyoon Kim, Jongsung Kim
openaire   +1 more source

Preimage and Second-Preimage Attacks on PGV Hashing Modes of Round-Reduced ARIA, Camellia, and Serpent

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2012
Deukjo HONG, Bonwook KOO, Dong-Chan KIM
openaire   +1 more source

Preimage attack on step reduced hash function HAVAL

Journal of Computer Applications, 2009
openaire   +1 more source

Home - About - Disclaimer - Privacy