Results 1 to 10 of about 708 (59)

Automating Collision Attacks on RIPEMD-160 [PDF]

open access: yesIACR Transactions on Symmetric Cryptology, 2023
As an ISO/IEC standard, the hash function RIPEMD-160 has been used to generate the Bitcoin address with SHA-256. However, due to the complex doublebranch structure of RIPEMD-160, the best collision attack only reaches 36 out of 80 steps of RIPEMD-160 ...
Yingxin Li, Fukang Liu, Gaoli Wang
doaj   +3 more sources

Throughput Enhancement of the RIPEMD-160 Design Using the Unfolding Transformation Technique [PDF]

open access: yes, 2021
: Many cryptographic applications use RIPEMD-160 hash functions, such as digital signatures, Hash Message Authentication Code (HMAC), and other data security applications.
Norhuzaimin, Julai   +2 more
core   +2 more sources

Complexity Analysis of Distinguishing Attack on 51-step RIPEMD-160 [PDF]

open access: yesJisuanji gongcheng, 2019
SASAKI Y,et al used message modification technology to differentiate attack on 51-step RIPEMD-160(Lecture Notes in Computer Science,Vol.7341),but they did not consider the influence of modular subtraction difference on differential routes,and could not ...
CUI Binbin, WANG Gaoli
doaj   +1 more source

Design and Analysis of New Version of Cryptographic Hash Function Based on Improved Chaotic Maps With Induced DNA Sequences

open access: yesIEEE Access, 2023
One of the first and most used hashing algorithms in blockchains is SHA-256 so the main aim of this paper is how to increase the security level of the blockchain based on the increasing hashing algorithm security.
Salwa M. Serag Eldin   +7 more
doaj   +1 more source

New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160

open access: yesIACR Transactions on Symmetric Cryptology, 2019
RIPEMD-160 is a hash function published in 1996, which shares similarities with other hash functions designed in this time-period like MD4, MD5 and SHA-1.
Fukang Liu   +5 more
doaj   +1 more source

Cryptanalysis of 48-step RIPEMD-160

open access: yesIACR Transactions on Symmetric Cryptology, 2017
In this paper, we show how to theoretically compute the step differential probability of RIPEMD-160 under the condition that only one internal variable contains difference and the difference is a power of 2.
Gaoli Wang, Yanzhao Shen, Fukang Liu
doaj   +1 more source

TumbleBit: an untrusted Bitcoin-compatible anonymous payment hub [PDF]

open access: yes, 2017
This paper presents TumbleBit, a new unidirectional unlinkable payment hub that is fully compatible with today s Bitcoin protocol. TumbleBit allows parties to make fast, anonymous, off-blockchain payments through an untrusted intermediary called the ...
AlShenibr, Leen   +4 more
core   +2 more sources

Стойкий к коллизиям алгоритм Whirlpool [PDF]

open access: yes, 2005
Requirements for collision-resistant hash functions, Whirlpool algorithm and aspects of crypto primitive security are considered.Рассмотрены требования к хеш функциям устойчивым к коллизиям, алгоритм Whirlpool и аспекты безопасности ...
Котух, Евгений   +1 more
core   +1 more source

Detecting brute-force attacks on cryptocurrency wallets

open access: yes, 2019
Blockchain is a distributed ledger, which is protected against malicious modifications by means of cryptographic tools, e.g. digital signatures and hash functions. One of the most prominent applications of blockchains is cryptocurrencies, such as Bitcoin.
AK Fedorov   +10 more
core   +1 more source

Home - About - Disclaimer - Privacy