Results 21 to 30 of about 4,920 (187)
Improved Preimage Attacks on RIPEMD-160 and HAS-160 [PDF]
Yanzhao Shen, Gaoli Wang
openalex +2 more sources
Improved MITM Cryptanalysis on Streebog
At ASIACRYPT 2012, Sasaki et al. introduced the guess-and-determine approach to extend the meet-in-the-middle (MITM) preimage attack. At CRYPTO 2021, Dong et al.
Jialiang Hua +5 more
doaj +1 more source
Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing
At EUROCRYPT 2006, Kelsey and Kohno proposed the so-called chosen target forced-prefix (CTFP) preimage attack, where for any challenge prefix P, the attacker can generate a suffix S such that H(P∥S) = y for some hash value y published in advance by the ...
Zhiyu Zhang +3 more
doaj +1 more source
A Preimage Attack on the MJH Hash Function
Jooyoung Lee, Jongsung Kim
openalex +3 more sources
Preimage Attack on 23-Step Tiger [PDF]
This paper evaluates the preimage resistance of the Tiger hash function. To our best knowledge, the maximum number of the attacked steps is 17 among previous preimage attacks on Tiger, where the full version has 24 steps. Our attack will extend the number of the attacked steps to 23.
Lei WANG, Yu SASAKI
openaire +2 more sources
REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs [PDF]
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency.
Al-Zubaidie, Mishall +2 more
core +2 more sources
Improved preimage attack on one-block MD4 [PDF]
MD4 is a hash function designed by Rivest in 1990. The design philosophy of many important hash functions, such as MD5, SHA-1 and SHA-2, originated from that of MD4. We propose an improved preimage attack on one-block MD4 with the time complexity 2^9^5 MD4 compression function operations, as compared to the 2^1^0^7 complexity of the previous attack by ...
Jinmin Zhong, Xuejia Lai
openaire +1 more source
Practical Preimages for Maraca [PDF]
We show a practical preimage attack on the cryptographic hash function Maraca, which was submitted as a candidate to the NIST SHA-3 competition.
Indesteege, Sebastiaan, Preneel, Bart
core +1 more source
On hash functions using checksums [PDF]
We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one-way checksum ...
J. Hoch +7 more
core +3 more sources
Applying Grover's Algorithm to Hash Functions: A Software Perspective
Quantum software frameworks provide software engineers with the tools to study quantum algorithms as applied to practical problems. We implement classical hash functions MD5, SHA-1, SHA-2, and SHA-3 as quantum oracles to study the computational resource ...
Richard H. Preston
doaj +1 more source

