Abstract. In Eurocrypt’05, Wang et al. presented new techniques to find collisions of Hash function MD4. The techniques are not only effi-cient to search for collisions, but also applicable to explore the second-preimage of MD4. About the second-preimage attack, they showed that a random message was a weak message with probability 2−122 and it only needed a one-time MD4 computation to find the second-preimage corresponding to the weak message. A weak message means that there exits a more efficient attack than the brute force attack to find its second-preimage. In this paper, we find another new collision differential path which can be used to find the second-preimage for more weak messages. For any random message, it is a weak message with ...
Abstract. We revisit narrow-pipe designs that are in practical use, and their security against preim...
In this paper, we present an improved attack algorithm to find two-block collisions of the hash func...
In this paper we present concrete collision and preimage attacks on a large class of compression fun...
Abstract. MD4 is a hash function developed by Rivest in 1990. It serves as the basis for most of the...
In [Rive90] the MD4 message digest algorithm was introduced taking an input message of arbitrary len...
In this paper, we present a fast attack algorithm to find two-block collision of hash function MD5. ...
Abstract. In 1990 Rivest introduced the hash function MD4. Two years later RIPEMD, a European propos...
We present the first collision and preimage security analysis of MDC-4, a 24 years old construction ...
Abstract. This paper proposes several approaches to improve the col-lision attack on MD4 proposed by...
In this paper, we present an improved attack algorithm to find two-block collisions of the hash func...
In this paper, we present an improved attack algorithm to find two-block collisions of the hash func...
We revisit narrow-pipe designs that are in practical use, and their security against preimage attack...
In this paper, we provide some cryptanalytic results for double-block-length (DBL) hash modes of blo...
In this paper, we provide some cryptanalytic results for double-block-length (DBL) hash modes of blo...
We revisit narrow-pipe designs that are in practical use, and their security against preimage attack...
Abstract. We revisit narrow-pipe designs that are in practical use, and their security against preim...
In this paper, we present an improved attack algorithm to find two-block collisions of the hash func...
In this paper we present concrete collision and preimage attacks on a large class of compression fun...
Abstract. MD4 is a hash function developed by Rivest in 1990. It serves as the basis for most of the...
In [Rive90] the MD4 message digest algorithm was introduced taking an input message of arbitrary len...
In this paper, we present a fast attack algorithm to find two-block collision of hash function MD5. ...
Abstract. In 1990 Rivest introduced the hash function MD4. Two years later RIPEMD, a European propos...
We present the first collision and preimage security analysis of MDC-4, a 24 years old construction ...
Abstract. This paper proposes several approaches to improve the col-lision attack on MD4 proposed by...
In this paper, we present an improved attack algorithm to find two-block collisions of the hash func...
In this paper, we present an improved attack algorithm to find two-block collisions of the hash func...
We revisit narrow-pipe designs that are in practical use, and their security against preimage attack...
In this paper, we provide some cryptanalytic results for double-block-length (DBL) hash modes of blo...
In this paper, we provide some cryptanalytic results for double-block-length (DBL) hash modes of blo...
We revisit narrow-pipe designs that are in practical use, and their security against preimage attack...
Abstract. We revisit narrow-pipe designs that are in practical use, and their security against preim...
In this paper, we present an improved attack algorithm to find two-block collisions of the hash func...
In this paper we present concrete collision and preimage attacks on a large class of compression fun...