The following pages link to Cryptanalysis of MD4 (Q1281786):
Displaying 26 items.
- A structure-based chaotic hashing scheme (Q327795) (← links)
- RIPEMD with two-round compress function is not collision-free (Q676830) (← links)
- A combinatorial analysis of recent attacks on step reduced SHA-2 family (Q1032494) (← links)
- Security analysis of randomize-hash-then-sign digital signatures (Q1928773) (← links)
- Constructing quantum hash functions based on quantum walks on Johnson graphs (Q1993776) (← links)
- Simple hash function using discrete-time quantum walks (Q1993832) (← links)
- Cryptanalysis of SHA-0 and reduced SHA-1 (Q2018819) (← links)
- Cryptanalysis of MD2 (Q2267363) (← links)
- The rebound attack and subspace distinguishers: application to Whirlpool (Q2344049) (← links)
- Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD (Q2637303) (← links)
- The NIST SHA-3 Competition: A Perspective on the Final Year (Q3011930) (← links)
- Multicollision attacks and generalized iterated hash functions (Q3068175) (← links)
- Optimal Covering Codes for Finding Near-Collisions (Q3084254) (← links)
- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis (Q3452233) (← links)
- Fast Hashing on the Pentium (Q3452359) (← links)
- Extracts from the SHA-3 Competition (Q3455489) (← links)
- MD4 is Not One-Way (Q3525692) (← links)
- New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru (Q3525694) (← links)
- Cryptanalysis of MDC-2 (Q3627430) (← links)
- Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256 (Q3634493) (← links)
- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others (Q3634495) (← links)
- Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques (Q3644204) (← links)
- On the need for multipermutations: Cryptanalysis of MD4 and SAFER (Q4484904) (← links)
- Applications of SAT Solvers in Cryptanalysis: Finding Weak Keys and Preimages (Q5015592) (← links)
- Cryptanalysis of the Hash Functions MD4 and RIPEMD (Q5385717) (← links)
- How to Break MD5 and Other Hash Functions (Q5385718) (← links)