As an ISO/IEC standard, the hash function RIPEMD-160 has been used to generate the Bitcoin address with SHA-256. However, due to the complex doublebranch structure of RIPEMD-160, the best collision attack only reaches 36 out of 80 steps of RIPEMD-160, and the best semi-free-start (SFS) collision attack only reaches 40 steps. To improve the 36-step collision attack proposed at EUROCRYPT 2023, we explored the possibility of using different message differences to increase the number of attacked steps, and we finally identified one choice allowing a 40-step collision attack. To find the corresponding 40-step differential characteristic, we re-implement the MILP-based method to search for signed differential characteristics with SAT/SMT. As a re...
In this paper, we present a collision attack on the SHA-3 submission SHAMATA. SHAMATA is a stream ci...
The concept of counter-cryptanalysis and a collision detection algorithm that detects whether a give...
In this paper, we present a fast attack algorithm to find two-block collision of hash function MD5. ...
RIPEMD-160 is a hash function published in 1996, which shares similarities with other hash functions...
RIPEMD-160 is an ISO/IEC standard and has been applied to generate the Bitcoin address with SHA-256....
In this paper, we propose an improved cryptanalysis of the double-branch hash function RIPEMD-160 s...
RIPEMD-128 is an ISO/IEC standard cryptographic hash function proposed in 1996 by Dobbertin, Bossela...
Abstract. In this paper, we analyze the security of RIPEMD-128 against collision attacks. The ISO/IE...
In this article, the RIPEMD-160 hash function is studied in detail. To analyze the hash function, we...
Abstract. In this paper, we focus on the construction of semi-free-start collisions for SHA-256, and...
International audienceA chosen-prefix collision attack is a stronger variant of a collision attack, ...
In this paper, we show how to theoretically compute the step differential probability of RIPEMD-160 ...
Counter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks...
International audienceIn this paper we analyze the security of the compression function of SHA-1 aga...
HAS-160 is an iterated cryptographic hash function that is widely used in Korea. In this article, we...
In this paper, we present a collision attack on the SHA-3 submission SHAMATA. SHAMATA is a stream ci...
The concept of counter-cryptanalysis and a collision detection algorithm that detects whether a give...
In this paper, we present a fast attack algorithm to find two-block collision of hash function MD5. ...
RIPEMD-160 is a hash function published in 1996, which shares similarities with other hash functions...
RIPEMD-160 is an ISO/IEC standard and has been applied to generate the Bitcoin address with SHA-256....
In this paper, we propose an improved cryptanalysis of the double-branch hash function RIPEMD-160 s...
RIPEMD-128 is an ISO/IEC standard cryptographic hash function proposed in 1996 by Dobbertin, Bossela...
Abstract. In this paper, we analyze the security of RIPEMD-128 against collision attacks. The ISO/IE...
In this article, the RIPEMD-160 hash function is studied in detail. To analyze the hash function, we...
Abstract. In this paper, we focus on the construction of semi-free-start collisions for SHA-256, and...
International audienceA chosen-prefix collision attack is a stronger variant of a collision attack, ...
In this paper, we show how to theoretically compute the step differential probability of RIPEMD-160 ...
Counter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks...
International audienceIn this paper we analyze the security of the compression function of SHA-1 aga...
HAS-160 is an iterated cryptographic hash function that is widely used in Korea. In this article, we...
In this paper, we present a collision attack on the SHA-3 submission SHAMATA. SHAMATA is a stream ci...
The concept of counter-cryptanalysis and a collision detection algorithm that detects whether a give...
In this paper, we present a fast attack algorithm to find two-block collision of hash function MD5. ...