Abstract. This paper shows new preimage attacks on reduced Tiger and SHA-2. Indesteege and Preneel presented a preimage attack on Tiger reduced to 13 rounds (out of 24) with a complexity of 2128:5. Our new preimage attack finds a one-block preimage of Tiger reduced to 16 rounds with a complexity of 2161. The proposed attack is based on meet-in-the-middle attacks. It seems difficult to find “independent words ” of Tiger at first glance, since its key schedule function is much more compli-cated than that of MD4 or MD5. However, we developed techniques to find independent words efficiently by controlling its internal variables. Surprisingly, the similar techniques can be applied to SHA-2 includin
Abstract. At CRYPTO 2012, Knellwolf and Khovratovich presented a differential formulation of advance...
Abstract. In this paper, we suggest a preimage attack on Hashing with Polynomials [2]. The algorithm...
Hashing modes are ways to convert a block cipher into a hash function, and those with AES as the und...
We revisit narrow-pipe designs that are in practical use, and their security against preimage attack...
We revisit narrow-pipe designs that are in practical use, and their security against preimage attack...
Abstract. We revisit narrow-pipe designs that are in practical use, and their security against preim...
Abstract. The cryptanalysis of the cryptographic hash function Tiger has, until now, focussed on fin...
The cryptanalysis of the cryptographic hash function Tiger [AB96] has, until now, focussed on findin...
Tiger is a cryptographic hash function with a 192-bit hash value. It was proposed by Anderson and Bi...
The Grøstl hash function is one of the five finalists in the third round of SHA-3 competition hosted...
International audienceAt CRYPTO 2012, Knellwolf and Khovratovich presented a differential formulatio...
In this paper, we provide an improved method on preimage attacks of standard 3-round Keccak-224/256....
In this paper, we provide some cryptanalytic results for double-block-length (DBL) hash modes of blo...
Abstract. In this paper, we present the first cryptographic preimage attack on the full MD5 hash fun...
Abstract. In August 2012, the Stribog hash function was selected as the new Russian cryptographic ha...
Abstract. At CRYPTO 2012, Knellwolf and Khovratovich presented a differential formulation of advance...
Abstract. In this paper, we suggest a preimage attack on Hashing with Polynomials [2]. The algorithm...
Hashing modes are ways to convert a block cipher into a hash function, and those with AES as the und...
We revisit narrow-pipe designs that are in practical use, and their security against preimage attack...
We revisit narrow-pipe designs that are in practical use, and their security against preimage attack...
Abstract. We revisit narrow-pipe designs that are in practical use, and their security against preim...
Abstract. The cryptanalysis of the cryptographic hash function Tiger has, until now, focussed on fin...
The cryptanalysis of the cryptographic hash function Tiger [AB96] has, until now, focussed on findin...
Tiger is a cryptographic hash function with a 192-bit hash value. It was proposed by Anderson and Bi...
The Grøstl hash function is one of the five finalists in the third round of SHA-3 competition hosted...
International audienceAt CRYPTO 2012, Knellwolf and Khovratovich presented a differential formulatio...
In this paper, we provide an improved method on preimage attacks of standard 3-round Keccak-224/256....
In this paper, we provide some cryptanalytic results for double-block-length (DBL) hash modes of blo...
Abstract. In this paper, we present the first cryptographic preimage attack on the full MD5 hash fun...
Abstract. In August 2012, the Stribog hash function was selected as the new Russian cryptographic ha...
Abstract. At CRYPTO 2012, Knellwolf and Khovratovich presented a differential formulation of advance...
Abstract. In this paper, we suggest a preimage attack on Hashing with Polynomials [2]. The algorithm...
Hashing modes are ways to convert a block cipher into a hash function, and those with AES as the und...