Results 1 to 10 of about 708 (59)
Automating Collision Attacks on RIPEMD-160 [PDF]
As an ISO/IEC standard, the hash function RIPEMD-160 has been used to generate the Bitcoin address with SHA-256. However, due to the complex doublebranch structure of RIPEMD-160, the best collision attack only reaches 36 out of 80 steps of RIPEMD-160 ...
Yingxin Li, Fukang Liu, Gaoli Wang
doaj +3 more sources
Trial encoding algorithms ensemble. [PDF]
Cheng LB, Yeh RJ.
europepmc +2 more sources
Throughput Enhancement of the RIPEMD-160 Design Using the Unfolding Transformation Technique [PDF]
: Many cryptographic applications use RIPEMD-160 hash functions, such as digital signatures, Hash Message Authentication Code (HMAC), and other data security applications.
Norhuzaimin, Julai +2 more
core +2 more sources
Complexity Analysis of Distinguishing Attack on 51-step RIPEMD-160 [PDF]
SASAKI Y,et al used message modification technology to differentiate attack on 51-step RIPEMD-160(Lecture Notes in Computer Science,Vol.7341),but they did not consider the influence of modular subtraction difference on differential routes,and could not ...
CUI Binbin, WANG Gaoli
doaj +1 more source
One of the first and most used hashing algorithms in blockchains is SHA-256 so the main aim of this paper is how to increase the security level of the blockchain based on the increasing hashing algorithm security.
Salwa M. Serag Eldin +7 more
doaj +1 more source
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160
RIPEMD-160 is a hash function published in 1996, which shares similarities with other hash functions designed in this time-period like MD4, MD5 and SHA-1.
Fukang Liu +5 more
doaj +1 more source
Cryptanalysis of 48-step RIPEMD-160
In this paper, we show how to theoretically compute the step differential probability of RIPEMD-160 under the condition that only one internal variable contains difference and the difference is a power of 2.
Gaoli Wang, Yanzhao Shen, Fukang Liu
doaj +1 more source
TumbleBit: an untrusted Bitcoin-compatible anonymous payment hub [PDF]
This paper presents TumbleBit, a new unidirectional unlinkable payment hub that is fully compatible with today s Bitcoin protocol. TumbleBit allows parties to make fast, anonymous, off-blockchain payments through an untrusted intermediary called the ...
AlShenibr, Leen +4 more
core +2 more sources
Стойкий к коллизиям алгоритм Whirlpool [PDF]
Requirements for collision-resistant hash functions, Whirlpool algorithm and aspects of crypto primitive security are considered.Рассмотрены требования к хеш функциям устойчивым к коллизиям, алгоритм Whirlpool и аспекты безопасности ...
Котух, Евгений +1 more
core +1 more source
Detecting brute-force attacks on cryptocurrency wallets
Blockchain is a distributed ledger, which is protected against malicious modifications by means of cryptographic tools, e.g. digital signatures and hash functions. One of the most prominent applications of blockchains is cryptocurrencies, such as Bitcoin.
AK Fedorov +10 more
core +1 more source

