In this article, the RIPEMD-160 hash function is studied in detail. To analyze the hash function, we have extended existing approaches and used recent results in cryptanalysis. While RIPEMD and RIPEMD-128 reduced to 3 rounds are vulnerable to the attack, it is not feasible for RIPEMD-160. Furthermore, we present an analytical attack on a round-reduced variant of the RIPEMD-160 hash function. To the best of our knowledge this is the first article that investigates the impact of recent advances in cryptanalysis of hash functions on RIPEMD-160. © Springer-Verlag Berlin Heidelberg 2006.status: publishe
Cryptographic hash functions are an important building block for a wide range of applications such a...
The Zemor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...
Tiger is a cryptographic hash function with a 192-bit hash value. It was proposed by Anderson and Bi...
In this paper, we propose an improved cryptanalysis of the double-branch hash function RIPEMD-160 s...
Abstract. In this paper, we analyze the security of RIPEMD-128 against collision attacks. The ISO/IE...
RIPEMD-160 is a hash function published in 1996, which shares similarities with other hash functions...
Abstract. MD4 is a hash function developed by Rivest in 1990. It serves as the basis for most of the...
As an ISO/IEC standard, the hash function RIPEMD-160 has been used to generate the Bitcoin address w...
© Springer-Verlag Berlin Heidelberg 1996. Cryptographic hash functions are an important tool in cryp...
Abstract. In 1990 Rivest introduced the hash function MD4. Two years later RIPEMD, a European propos...
RIPEMD-128 is an ISO/IEC standard cryptographic hash function proposed in 1996 by Dobbertin, Bossela...
RIPEMD-160 is an ISO/IEC standard and has been applied to generate the Bitcoin address with SHA-256....
In this paper, we show how to theoretically compute the step differential probability of RIPEMD-160 ...
This paper presents differential-based distinguishers against double-branch compression functions an...
The Zémor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...
Cryptographic hash functions are an important building block for a wide range of applications such a...
The Zemor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...
Tiger is a cryptographic hash function with a 192-bit hash value. It was proposed by Anderson and Bi...
In this paper, we propose an improved cryptanalysis of the double-branch hash function RIPEMD-160 s...
Abstract. In this paper, we analyze the security of RIPEMD-128 against collision attacks. The ISO/IE...
RIPEMD-160 is a hash function published in 1996, which shares similarities with other hash functions...
Abstract. MD4 is a hash function developed by Rivest in 1990. It serves as the basis for most of the...
As an ISO/IEC standard, the hash function RIPEMD-160 has been used to generate the Bitcoin address w...
© Springer-Verlag Berlin Heidelberg 1996. Cryptographic hash functions are an important tool in cryp...
Abstract. In 1990 Rivest introduced the hash function MD4. Two years later RIPEMD, a European propos...
RIPEMD-128 is an ISO/IEC standard cryptographic hash function proposed in 1996 by Dobbertin, Bossela...
RIPEMD-160 is an ISO/IEC standard and has been applied to generate the Bitcoin address with SHA-256....
In this paper, we show how to theoretically compute the step differential probability of RIPEMD-160 ...
This paper presents differential-based distinguishers against double-branch compression functions an...
The Zémor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...
Cryptographic hash functions are an important building block for a wide range of applications such a...
The Zemor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...
Tiger is a cryptographic hash function with a 192-bit hash value. It was proposed by Anderson and Bi...