An improved preimage attack against \texttt{HAVAL-3}
From MaRDI portal
Publication:477698
DOI10.1016/J.IPL.2014.10.016zbMath1320.94065OpenAlexW2074998919MaRDI QIDQ477698
Jian Guo, Wun-She Yap, Chun-hua Su
Publication date: 9 December 2014
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2014.10.016
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Topics in cryptology -- CT-RSA 2011. The cryptographers' track at the RSA conference 2011, San Francisco, CA, USA, February 14--18, 2011. Proceedings
- Advances in cryptology -- CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16--20, 2009. Proceedings
- Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10--13, 2008. Revised selected papers
- Advances in cryptology -- EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26--30, 2009. Proceedings
- Fast software encryption. 16th international workshop, FSE 2009, Leuven, Belgium, February 22--25, 2009. Revised selected papers
- Cryptanalysis of HMAC/NMAC-Whirlpool
- New Preimage Attacks against Reduced SHA-1
- Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds
- Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster)
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- (Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach
- Meet-in-the-Middle Attacks on Reduced-Round XTEA
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
- New Birthday Attacks on Some MACs Based on Block Ciphers
- Meet-in-the-Middle Attacks on SHA-3 Candidates
- New Distinguishing Attack on MAC Using Secret-Prefix Method
- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
- A Meet-in-the-Middle Attack on 8-Round AES
- MD4 is Not One-Way
- Preimages for Reduced SHA-0 and SHA-1
- Preimage Attacks on 3, 4, and 5-Pass HAVAL
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others
- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
- Preimages for Step-Reduced SHA-2
- Improved Meet-in-the-Middle Attacks on Reduced-Round DES
- Selected Areas in Cryptography
This page was built for publication: An improved preimage attack against \texttt{HAVAL-3}