Cryptanalysis of the Hash Functions MD4 and RIPEMD
From MaRDI portal
Publication:5385717
DOI10.1007/11426639_1zbMath1137.94358OpenAlexW1590269592MaRDI QIDQ5385717
Xuejia Lai, Xiaoyun Wang, Dengguo Feng, Hui Chen, Xiu Yuan Yu
Publication date: 6 May 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11426639_1
Related Items (59)
Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL ⋮ Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD ⋮ New second-preimage attacks on hash functions ⋮ Cryptanalysis of full \texttt{RIPEMD-128} ⋮ Survey of information security ⋮ Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160 ⋮ Security analysis of randomize-hash-then-sign digital signatures ⋮ Cryptanalysis of Grindahl ⋮ Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP ⋮ Does Secure Time-Stamping Imply Collision-Free Hash Functions? ⋮ Allocating rotational cryptanalysis-based preimage attack on 4-round \textsc{Keccak}-224 for quantum setting ⋮ Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function ⋮ Attacking Reduced Round SHA-256 ⋮ Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography ⋮ A Novel Approach for Constructing One-Way Hash Function Based on a Message Block Controlled 8D Hyperchaotic Map ⋮ Collision attack on \({\mathtt Grindahl}\) ⋮ Collisions for Round-Reduced LAKE ⋮ Quantum and semi-quantum lottery: strategies and advantages ⋮ Keyed hash function based on a chaotic map ⋮ On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak ⋮ Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL ⋮ A (Second) Preimage Attack on the GOST Hash Function ⋮ MD4 is Not One-Way ⋮ New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru ⋮ Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL ⋮ Weaknesses in the HAS-V Compression Function ⋮ Design and Analysis on a Parallel Chaos-Based Hash Function ⋮ Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck ⋮ Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function ⋮ Simple hash function using discrete-time quantum walks ⋮ One-way hash function construction based on 2D coupled map lattices ⋮ Collision Resistant Double-Length Hashing ⋮ Herding Hash Functions and the Nostradamus Attack ⋮ Cryptanalysis of SHA-0 and reduced SHA-1 ⋮ Cryptanalysis of the GOST Hash Function ⋮ Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures ⋮ Parallel hash function construction based on coupled map lattices ⋮ Multi-property Preserving Combiners for Hash Functions ⋮ Collisions for 70-Step SHA-1: On the Full Cost of Collision Search ⋮ Cryptanalysis of the CRUSH Hash Function ⋮ The Delicate Issues of Addition with Respect to XOR Differences ⋮ New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 ⋮ MJH: A Faster Alternative to MDC-2 ⋮ Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC ⋮ Security Analysis of SIMD ⋮ Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256 ⋮ Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others ⋮ One-Way Hash Function Based on Delay-Induced Hyperchaos ⋮ Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL ⋮ Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5 ⋮ Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques ⋮ On the impossibility of highly-efficient blockcipher-based hash functions ⋮ A combinatorial analysis of recent attacks on step reduced SHA-2 family ⋮ Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security ⋮ Hash function based on quantum walks ⋮ BREAKING A CHAOTIC IMAGE ENCRYPTION ALGORITHM BASED ON MODULO ADDITION AND XOR OPERATION ⋮ How to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash Functions ⋮ A quantum hash function with grouped coarse-grained boson sampling ⋮ Preimage attacks on 4-round Keccak by solving multivariate quadratic systems
Uses Software
This page was built for publication: Cryptanalysis of the Hash Functions MD4 and RIPEMD