Finding Preimages in Full MD5 Faster Than Exhaustive Search

From MaRDI portal
Publication:3627432

DOI10.1007/978-3-642-01001-9_8zbMath1239.94064OpenAlexW1530387410MaRDI QIDQ3627432

Kazumaro Aoki, Yu Sasaki

Publication date: 12 May 2009

Published in: Advances in Cryptology - EUROCRYPT 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-01001-9_8




Related Items (32)

Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVALMeet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementationsWARP: revisiting GFN for lightweight 128-bit block cipherExtended meet-in-the-middle attacks on some Feistel constructionsAll Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle ApproachHigher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKECollision attack on the full extended MD4 and pseudo-preimage attack on RIPEMDNew second-preimage attacks on hash functionsCryptanalysis of Reduced-Round WhirlwindBicliques with Minimal Data and Time Complexity for AESSecurity analysis of randomize-hash-then-sign digital signaturesMeet-in-the-middle attack with splice-and-cut technique and a general automatic frameworkImproved attacks against reduced-round WhirlwindMeet-in-the-middle preimage attacks on sponge-based hashingSuperposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashingMind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}A single-key attack on the full GOST block cipherMultidimensional meet-in-the-middle attack and its applications to KATAN32/48/64An improved preimage attack against \texttt{HAVAL-3}Collisions of MMO-MD5 and Their Impact on Original MD5A Single-Key Attack on the Full GOST Block CipherMeet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to WhirlpoolConstructing quantum hash functions based on quantum walks on Johnson graphsSimple hash function using discrete-time quantum walks(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision ApproachMJH: A Faster Alternative to MDC-2Meet-in-the-Middle Attacks on Reduced-Round XTEAA 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTANMeet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and OthersAutomatic search of meet-in-the-middle preimage attacks on AES-like hashingMeet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL



Cites Work


This page was built for publication: Finding Preimages in Full MD5 Faster Than Exhaustive Search