Results 21 to 30 of about 4,920 (187)

Improved Preimage Attacks on RIPEMD-160 and HAS-160 [PDF]

open access: bronzeKSII Transactions on Internet and Information Systems, 2018
Yanzhao Shen, Gaoli Wang
openalex   +2 more sources

Improved MITM Cryptanalysis on Streebog

open access: yesIACR Transactions on Symmetric Cryptology, 2022
At ASIACRYPT 2012, Sasaki et al. introduced the guess-and-determine approach to extend the meet-in-the-middle (MITM) preimage attack. At CRYPTO 2021, Dong et al.
Jialiang Hua   +5 more
doaj   +1 more source

Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing

open access: yesIACR Transactions on Symmetric Cryptology, 2023
At EUROCRYPT 2006, Kelsey and Kohno proposed the so-called chosen target forced-prefix (CTFP) preimage attack, where for any challenge prefix P, the attacker can generate a suffix S such that H(P∥S) = y for some hash value y published in advance by the ...
Zhiyu Zhang   +3 more
doaj   +1 more source

A Preimage Attack on the MJH Hash Function

open access: diamondJournal of the Korea Institute of Information Security and Cryptology, 2016
Jooyoung Lee, Jongsung Kim
openalex   +3 more sources

Preimage Attack on 23-Step Tiger [PDF]

open access: yesIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011
This paper evaluates the preimage resistance of the Tiger hash function. To our best knowledge, the maximum number of the attacked steps is 17 among previous preimage attacks on Tiger, where the full version has 24 steps. Our attack will extend the number of the attacked steps to 23.
Lei WANG, Yu SASAKI
openaire   +2 more sources

REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs [PDF]

open access: yes, 2020
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency.
Al-Zubaidie, Mishall   +2 more
core   +2 more sources

Improved preimage attack on one-block MD4 [PDF]

open access: yesJournal of Systems and Software, 2012
MD4 is a hash function designed by Rivest in 1990. The design philosophy of many important hash functions, such as MD5, SHA-1 and SHA-2, originated from that of MD4. We propose an improved preimage attack on one-block MD4 with the time complexity 2^9^5 MD4 compression function operations, as compared to the 2^1^0^7 complexity of the previous attack by ...
Jinmin Zhong, Xuejia Lai
openaire   +1 more source

Practical Preimages for Maraca [PDF]

open access: yes, 2009
We show a practical preimage attack on the cryptographic hash function Maraca, which was submitted as a candidate to the NIST SHA-3 competition.
Indesteege, Sebastiaan, Preneel, Bart
core   +1 more source

On hash functions using checksums [PDF]

open access: yes, 2008
We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one-way checksum ...
J. Hoch   +7 more
core   +3 more sources

Applying Grover's Algorithm to Hash Functions: A Software Perspective

open access: yesIEEE Transactions on Quantum Engineering, 2022
Quantum software frameworks provide software engineers with the tools to study quantum algorithms as applied to practical problems. We implement classical hash functions MD5, SHA-1, SHA-2, and SHA-3 as quantum oracles to study the computational resource ...
Richard H. Preston
doaj   +1 more source

Home - About - Disclaimer - Privacy