Tiger is a cryptographic hash function with a 192-bit hash value. It was proposed by Anderson and Biham in 1996. Recently, weaknesses have been shown in round-reduced variants of the Tiger hash function. First, at FSE 2006, Kelsey and Lucks presented a collision attack on Tiger reduced to 16 and 17 (out of 24) rounds with a complexity of about 244 and a pseudo-near-collision for Tiger reduced to 20 rounds. Later, Mendel et al. extended this attack to a collision attack on Tiger reduced to 19 rounds with a complexity of about 2 62. Furthermore, they show a pseudo-near-collision for Tiger reduced to 22 rounds with a complexity of about 244. No attack is known for the full Tiger hash function. In this article, we show a pseudo-near-collision f...
Abstract. The GOST hash function family has served as the new Russian national hash standard (GOST R...
The EnRUPT hash functions were proposed by O'Neil, Nohl and Henzen [5] as candidates for the SHA-3 c...
In this paper we present a cryptanalysis of a new 256-bit hash function, FORK-256, proposed by Hong ...
Abstract. The cryptanalysis of the cryptographic hash function Tiger has, until now, focussed on fin...
The cryptanalysis of the cryptographic hash function Tiger [AB96] has, until now, focussed on findin...
Among those cryptographic hash function which are not based on block ciphers, MD4 and Snefru seemed ...
In this article, the RIPEMD-160 hash function is studied in detail. To analyze the hash function, we...
JH, designed by Wu, is one of the 14 second-round candidates in the NIST Hash Competition. This pape...
We revisit narrow-pipe designs that are in practical use, and their security against preimage attack...
Abstract. This paper shows new preimage attacks on reduced Tiger and SHA-2. Indesteege and Preneel p...
The Zémor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...
We revisit narrow-pipe designs that are in practical use, and their security against preimage attack...
HAS-160 is an iterated cryptographic hash function that is widely used in Korea. In this article, we...
In a paper published in FSE 2007, a way of obtaining near-collisions and in theory also collisions f...
The Zemor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...
Abstract. The GOST hash function family has served as the new Russian national hash standard (GOST R...
The EnRUPT hash functions were proposed by O'Neil, Nohl and Henzen [5] as candidates for the SHA-3 c...
In this paper we present a cryptanalysis of a new 256-bit hash function, FORK-256, proposed by Hong ...
Abstract. The cryptanalysis of the cryptographic hash function Tiger has, until now, focussed on fin...
The cryptanalysis of the cryptographic hash function Tiger [AB96] has, until now, focussed on findin...
Among those cryptographic hash function which are not based on block ciphers, MD4 and Snefru seemed ...
In this article, the RIPEMD-160 hash function is studied in detail. To analyze the hash function, we...
JH, designed by Wu, is one of the 14 second-round candidates in the NIST Hash Competition. This pape...
We revisit narrow-pipe designs that are in practical use, and their security against preimage attack...
Abstract. This paper shows new preimage attacks on reduced Tiger and SHA-2. Indesteege and Preneel p...
The Zémor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...
We revisit narrow-pipe designs that are in practical use, and their security against preimage attack...
HAS-160 is an iterated cryptographic hash function that is widely used in Korea. In this article, we...
In a paper published in FSE 2007, a way of obtaining near-collisions and in theory also collisions f...
The Zemor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...
Abstract. The GOST hash function family has served as the new Russian national hash standard (GOST R...
The EnRUPT hash functions were proposed by O'Neil, Nohl and Henzen [5] as candidates for the SHA-3 c...
In this paper we present a cryptanalysis of a new 256-bit hash function, FORK-256, proposed by Hong ...