Cryptanalysis of the Hash Functions MD4 and RIPEMD

From MaRDI portal
Publication:5385717

DOI10.1007/11426639_1zbMath1137.94358OpenAlexW1590269592MaRDI QIDQ5385717

Xuejia Lai, Xiaoyun Wang, Dengguo Feng, Hui Chen, Xiu Yuan Yu

Publication date: 6 May 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11426639_1




Related Items (59)

Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVALCollision attack on the full extended MD4 and pseudo-preimage attack on RIPEMDNew second-preimage attacks on hash functionsCryptanalysis of full \texttt{RIPEMD-128}Survey of information securityImproved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160Security analysis of randomize-hash-then-sign digital signaturesCryptanalysis of GrindahlAnalysis of RIPEMD-160: new collision attacks and finding characteristics with MILPDoes Secure Time-Stamping Imply Collision-Free Hash Functions?Allocating rotational cryptanalysis-based preimage attack on 4-round \textsc{Keccak}-224 for quantum settingPassword Recovery on Challenge and Response: Impossible Differential Attack on Hash FunctionAttacking Reduced Round SHA-256Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric CryptographyA Novel Approach for Constructing One-Way Hash Function Based on a Message Block Controlled 8D Hyperchaotic MapCollision attack on \({\mathtt Grindahl}\)Collisions for Round-Reduced LAKEQuantum and semi-quantum lottery: strategies and advantagesKeyed hash function based on a chaotic mapOn the Strength of the Concatenated Hash Combiner When All the Hash Functions Are WeakSecond Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVALA (Second) Preimage Attack on the GOST Hash FunctionMD4 is Not One-WayNew Techniques for Cryptanalysis of Hash Functions and Improved Attacks on SnefruMulti-collision Attack on the Compression Functions of MD4 and 3-Pass HAVALWeaknesses in the HAS-V Compression FunctionDesign and Analysis on a Parallel Chaos-Based Hash FunctionAutomatic Search for the Best Trails in ARX: Application to Block Cipher SpeckPractical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression FunctionSimple hash function using discrete-time quantum walksOne-way hash function construction based on 2D coupled map latticesCollision Resistant Double-Length HashingHerding Hash Functions and the Nostradamus AttackCryptanalysis of SHA-0 and reduced SHA-1Cryptanalysis of the GOST Hash FunctionVerifiable Multi-secret Sharing Schemes for Multiple Threshold Access StructuresParallel hash function construction based on coupled map latticesMulti-property Preserving Combiners for Hash FunctionsCollisions for 70-Step SHA-1: On the Full Cost of Collision SearchCryptanalysis of the CRUSH Hash FunctionThe Delicate Issues of Addition with Respect to XOR DifferencesNew Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5MJH: A Faster Alternative to MDC-2Cryptanalysis on HMAC/NMAC-MD5 and MD5-MACSecurity Analysis of SIMDDistinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and OthersOne-Way Hash Function Based on Delay-Induced HyperchaosSecond Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVALPreimage Attacks on 3-Pass HAVAL and Step-Reduced MD5Analysis of the Collision Resistance of RadioGatúnUsing Algebraic TechniquesOn the impossibility of highly-efficient blockcipher-based hash functionsA combinatorial analysis of recent attacks on step reduced SHA-2 familyVerifiable shuffles: a formal model and a Paillier-based three-round construction with provable securityHash function based on quantum walksBREAKING A CHAOTIC IMAGE ENCRYPTION ALGORITHM BASED ON MODULO ADDITION AND XOR OPERATIONHow to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash FunctionsA quantum hash function with grouped coarse-grained boson samplingPreimage attacks on 4-round Keccak by solving multivariate quadratic systems


Uses Software



This page was built for publication: Cryptanalysis of the Hash Functions MD4 and RIPEMD