Mathematical Research Data Initiative
Main page
Recent changes
Random page
Help about MediaWiki
Create a new Item
Create a new Property
Create a new EntitySchema
Merge two items
In other projects
Discussion
View source
View history
Purge
English
Log in

Preimage Attacks on Reduced Tiger and SHA-2

From MaRDI portal
Publication:3391568
Jump to:navigation, search

DOI10.1007/978-3-642-03317-9_9zbMath1248.94073OpenAlexW1522989667MaRDI QIDQ3391568

Takanori Isobe, Kyoji Shibutani

Publication date: 11 August 2009

Published in: Fast Software Encryption (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-03317-9_9


zbMATH Keywords

hash functionmeet-in-the-middlepreimage attackSHA-256SHA-512Tigersecond preimage attack


Mathematics Subject Classification ID

Cryptography (94A60)


Related Items (5)

Quantum collision attacks on reduced SHA-256 and SHA-512 ⋮ Boomerang Attack on Step-Reduced SHA-512 ⋮ All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach ⋮ Two Passes of Tiger Are Not One-Way ⋮ Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL




This page was built for publication: Preimage Attacks on Reduced Tiger and SHA-2

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:3391568&oldid=16673139"
Tools
What links here
Related changes
Special pages
Printable version
Permanent link
Page information
MaRDI portal item
This page was last edited on 4 February 2024, at 17:57.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki