×

Found 63 Documents (Results 1–63)

Refinements of the \(k\)-tree algorithm for the generalized birthday problem. (English) Zbl 1382.94147

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 683-703 (2015).
MSC:  94A60 05C85
PDFBibTeX XMLCite
Full Text: DOI

How to incorporate associated data in sponge-based authenticated encryption. (English) Zbl 1382.94158

Nyberg, Kaisa (ed.), Topics in cryptology – CT-RSA 2015. The cryptographer’s track at the RSA conference 2015, San Francisco, CA, USA, April 20–24, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-16714-5/pbk; 978-3-319-16715-2/ebook). Lecture Notes in Computer Science 9048, 353-370 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds. (English) Zbl 1382.94115

Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 571-590 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Practical cryptanalysis of PAES. (English) Zbl 1382.94125

Joux, Antoine (ed.) et al., Selected areas in cryptography – SAC 2014. 21st international conference, Montreal, QC, Canada, August 14–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-13050-7/pbk; 978-3-319-13051-4/ebook). Lecture Notes in Computer Science 8781, 228-242 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Bitwise partial-sum on HIGHT: a new tool for integral analysis against ARX designs. (English) Zbl 1368.94127

Lee, Hyang-Sook (ed.) et al., Information security and cryptology – ICISC 2013. 16th international conference, Seoul, Korea, November 27–29, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12159-8/pbk; 978-3-319-12160-4/ebook). Lecture Notes in Computer Science 8565, 189-202 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved single-key distinguisher on HMAC-MD5 and key recovery attacks on sandwich-MAC-MD5. (English) Zbl 1362.94051

Lange, Tanja (ed.) et al., Selected areas in cryptography – SAC 2013. 20th international conference, Burnaby, BC, Canada, August 14–16, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43413-0/pbk; 978-3-662-43414-7/ebook). Lecture Notes in Computer Science 8282, 493-512 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of reduced-round SIMON32 and SIMON48. (English) Zbl 1344.94077

Meier, Willi (ed.) et al., Progress in cryptology – INDOCRYPT 2014. 15th international conference on cryptology in India, New Delhi, India, December 14–17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-13038-5/pbk; 978-3-319-13039-2/ebook). Lecture Notes in Computer Science 8885, 143-160 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Message extension attack against authenticated encryptions: application to PANDA. (English) Zbl 1378.94062

Gritzalis, Dimitris (ed.) et al., Cryptology and network security. 13th international conference, CANS 2014, Heraklion, Crete, Greece, October 22–24, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-12279-3/pbk). Lecture Notes in Computer Science 8813, 82-97 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Meet-in-the-middle attacks on generic Feistel constructions. (English) Zbl 1306.94058

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 458-477 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Generic attacks on strengthened HMAC: \(n\)-bit secure HMAC requires key in all blocks. (English) Zbl 1423.68158

Abdalla, Michel (ed.) et al., Security and cryptography for networks. 9th international conference, SCN 2014, Amalfi, Italy, September 3–5, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8642, 324-339 (2014).
MSC:  68P25 68P30 94A60
PDFBibTeX XMLCite
Full Text: DOI

Updates on generic attacks against HMAC and NMAC. (English) Zbl 1343.94059

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 131-148 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Memoryless unbalanced meet-in-the-middle attacks: impossible results and applications. (English) Zbl 1353.94072

Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 253-270 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

An automated evaluation tool for improved rebound attack: new distinguishers and proposals of shiftbytes parameters for Grøstl. (English) Zbl 1291.94150

Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 424-443 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Meet-in-the-middle technique for integral attacks against Feistel ciphers. (English) Zbl 1327.94073

Knudsen, Lars R. (ed.) et al., Selected areas in cryptography. 19th international conference, SAC 2012, Windsor, Canada, August 15–16, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-35998-9/pbk; 978-3-642-35999-6/ebook). Lecture Notes in Computer Science 7707, 234-251 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New property of diffusion switching mechanism on CLEFIA and its application to DFA. (English) Zbl 1414.94919

Sakiyama, Kazuo (ed.) et al., Advances in information and computer security. 8th international workshop on security, IWSEC 2013, Okinawa, Japan, November 18–20, 2013. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8231, 99-114 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC. (English) Zbl 1414.94914

Sakiyama, Kazuo (ed.) et al., Advances in information and computer security. 8th international workshop on security, IWSEC 2013, Okinawa, Japan, November 18–20, 2013. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8231, 83-98 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Preimage attacks on Feistel-SP functions: impact of omitting the last network twist. (English) Zbl 1330.94048

Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25–28, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38979-5/pbk). Lecture Notes in Computer Science 7954, 170-185 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Limited-birthday distinguishers for hash functions. Collisions beyond the birthday bound can be meaningful. (English) Zbl 1314.94076

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-42044-3/pbk). Lecture Notes in Computer Science 8270, 504-523 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of HMAC/NMAC-Whirlpool. (English) Zbl 1314.94070

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-42044-3/pbk). Lecture Notes in Computer Science 8270, 21-40 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Related-key boomerang attacks on KATAN32/48/64. (English) Zbl 1316.94079

Boyd, Colin (ed.) et al., Information security and privacy. 18th Australasian conference, ACISP 2013, Brisbane, Australia, July 1–3, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39058-6/pbk). Lecture Notes in Computer Science 7959, 268-285 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Key-dependent weakness of AES-based ciphers under clockwise collision distinguisher. (English) Zbl 1342.94090

Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 395-409 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Multi-differential cryptanalysis on reduced DM-PRESENT-80: collisions and other differential properties. (English) Zbl 1342.94078

Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 352-367 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Comprehensive study of integral analysis on 22-round LBlock. (English) Zbl 1342.94094

Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 156-169 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Double-SP is weaker than single-SP: rebound attacks on Feistel ciphers with several rounds. (English) Zbl 1295.94141

Galbraith, Steven (ed.) et al., Progress in cryptology – INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 265-282 (2012).
MSC:  94A60 68M10
PDFBibTeX XMLCite
Full Text: DOI

Polynomial-advantage cryptanalysis of 3D cipher and 3D-based hash function. (English) Zbl 1279.94122

Hanaoka, Goichiro (ed.) et al., Advances in information and computer security. 7th international workshop on security, IWSEC 2012, Fukuoka, Japan, November 7–9, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34116-8/pbk). Lecture Notes in Computer Science 7631, 170-181 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Boomerang distinguishers for full HAS-160 compression function. (English) Zbl 1292.94133

Hanaoka, Goichiro (ed.) et al., Advances in information and computer security. 7th international workshop on security, IWSEC 2012, Fukuoka, Japan, November 7–9, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34116-8/pbk). Lecture Notes in Computer Science 7631, 156-169 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Generic related-key attacks for HMAC. (English) Zbl 1292.94128

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 580-597 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks. (English) Zbl 1292.94134

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 562-579 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved integral analysis on tweaked Lesamnta. (English) Zbl 1301.94127

Kim, Howon (ed.), Information security and cryptology – ICISC 2011. 14th international conference, Seoul, Korea, November 30–December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 1-17 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Improved known-key distinguishers on Feistel-SP ciphers and application to Camellia. (English) Zbl 1305.94077

Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 87-100 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Three-subset meet-in-the-middle attack on reduced XTEA. (English) Zbl 1304.94083

Mitrokotsa, Aikaterini (ed.) et al., Progress in cryptology – AFRICACRYPT 2012. 5th international conference on cryptology in Africa, Ifrane, Morocco, July 10–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31409-4/pbk). Lecture Notes in Computer Science 7374, 138-154 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalyses on a Merkle-Damgård based MAC – almost universal forgery and distinguishing-\(H\) attacks. (English) Zbl 1297.94099

Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 411-427 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New truncated differential cryptanalysis on 3D block cipher. (English) Zbl 1291.94114

Ryan, Mark D. (ed.) et al., Information security practice and experience. 8th international conference, ISPEC 2012, Hangzhou, China, April 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29100-5/pbk). Lecture Notes in Computer Science 7232, 109-125 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Boomerang distinguishers on MD4-family: first practical results on full 5-pass HAVAL. (English) Zbl 1279.94114

Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 1-18 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Experimental verification of super-Sbox analysis – confirmation of detailed attack complexity. (English) Zbl 1344.94072

Iwata, Tetsu (ed.) et al., Advances in information and computer security. 6th international workshop, IWSEC 2011, Tokyo, Japan, November 8–10, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25140-5/pbk). Lecture Notes in Computer Science 7038, 178-192 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Preimage attacks against PKC98-Hash and HAS-V. (English) Zbl 1297.94100

Rhee, Kyung-Hyune (ed.) et al., Information security and cryptology – ICISC 2010. 13th international conference, Seoul, Korea, December 1–3, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-24208-3/pbk). Lecture Notes in Computer Science 6829, 68-91 (2011).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Preimage attacks on step-reduced RIPEMD-128 and RIPEMD-160. (English) Zbl 1295.94121

Lai, Xuejia (ed.) et al., Information security and cryptology. 6th international conference, Inscrypt 2010, Shanghai, China, October 20–24, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21517-9/pbk). Lecture Notes in Computer Science 6584, 169-186 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes. (English) Zbl 1307.94095

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 397-415 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool. (English) Zbl 1307.94094

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 378-396 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Preimage attacks on full-ARIRANG (poster). (English) Zbl 1295.94120

Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 417-422 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Collisions of MMO-MD5 and their impact on original MD5. (English) Zbl 1280.94093

Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2011. 4th international conference on cryptology in Africa, Dakar, Senegal, July 5–7, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21968-9/pbk). Lecture Notes in Computer Science 6737, 117-133 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

(Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach. (English) Zbl 1284.94123

Kiayias, Aggelos (ed.), Topics in cryptology – CT-RSA 2011. The cryptographers’ track at the RSA conference 2011, San Francisco, CA, USA, February 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19073-5/pbk). Lecture Notes in Computer Science 6558, 197-212 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl. (English) Zbl 1253.94067

Abe, Masayuki (ed.), Advances in cryptology – ASIACRYPT 2010. 16th international conference on the theory and application of cryptology and information security, Singapore, December 5–9, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17372-1/pbk). Lecture Notes in Computer Science 6477, 38-55 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Finding preimages of Tiger up to 23 steps. (English) Zbl 1285.94100

Hong, Seokhie (ed.) et al., Fast software encryption. 17th international workshop, FSE 2010, Seoul, Korea, February 7–10, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-13857-7/pbk). Lecture Notes in Computer Science 6147, 116-133 (2010).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Preimages for step-reduced SHA-2. (English) Zbl 1267.94030

Matsui, Mitsuru (ed.), Advances in cryptology – ASIACRYPT 2009. 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6–10, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10365-0/pbk). Lecture Notes in Computer Science 5912, 578-597 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Rebound attack on the full Lane compression function. (English) Zbl 1267.94083

Matsui, Mitsuru (ed.), Advances in cryptology – ASIACRYPT 2009. 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6–10, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10365-0/pbk). Lecture Notes in Computer Science 5912, 106-125 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalyses of narrow-pipe mode of operation in AURORA-512 hash function. (English) Zbl 1267.94093

Jacobson, Michael J. jun. (ed.) et al., Selected areas in cryptography. 16th annual international workshop, SAC 2009, Calgary, Alberta, Canada, August 13–14, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-05443-3/pbk). Lecture Notes in Computer Science 5867, 36-52 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Preimage attacks on one-block MD4, 63-step MD5 and more. (English) Zbl 1256.94040

Avanzi, Roberto Maria (ed.) et al., Selected areas in cryptography. 15th international workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14–15. Revised selected papers. Berlin: Springer (ISBN 978-3-642-04158-7/pbk). Lecture Notes in Computer Science 5381, 103-119 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Bit-free collision: application to APOP attack. (English) Zbl 1287.94103

Takagi, Tsuyoshi (ed.) et al., Advances in information and computer security. 4th international workshop on security, IWSEC 2009, Toyama, Japan, October 28–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04845-6/pbk). Lecture Notes in Computer Science 5824, 3-21 (2009).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1. (English) Zbl 1252.94043

Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 70-89 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Meet-in-the-middle preimage attacks on double-branch hash functions: application to RIPEMD and others. (English) Zbl 1284.94107

Boyd, Colin (ed.) et al., Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1–3, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). Lecture Notes in Computer Science 5594, 214-231 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Finding preimages in full MD5 faster than exhaustive search. (English) Zbl 1239.94064

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 134-152 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Preimage attacks on 3, 4, and 5-pass HAVAL. (English) Zbl 1206.94089

Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 253-271 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Preimage attacks on step-reduced MD5. (English) Zbl 1285.94094

Mu, Yi (ed.) et al., Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69971-2/pbk). Lecture Notes in Computer Science 5107, 282-296 (2008).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Password recovery on challenge and response: Impossible differential attack on hash function. (English) Zbl 1142.94359

Vaudenay, Serge (ed.), Progress in cryptology – AFRICACRYPT 2008. First international conference on cryptology in Africa, Casablanca, Morocco, June 11–14, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68159-5/pbk). Lecture Notes in Computer Science 5023, 290-307 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Security of MD5 challenge and response: Extension of APOP password recovery attack. (English) Zbl 1153.94428

Malkin, Tal (ed.), Topics in cryptology – CT-RSA 2008. The cryptographers’ track at the RSA conference 2008, San Francisco, CA, USA, April 8–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-79262-8/pbk). Lecture Notes in Computer Science 4964, 1-18 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A new strategy for finding a differential path of SHA-1. (English) Zbl 1213.94142

Pieprzyk, Josef (ed.) et al., Information security and privacy. 12th Australasian conference, ACISP 2007. Townsville, Australia, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73457-4/pbk). Lecture Notes in Computer Science 4586, 45-58 (2007).
MSC:  94A60 68P10
PDFBibTeX XMLCite
Full Text: DOI

New message difference for MD4. (English) Zbl 1186.94469

Biryukov, Alex (ed.), Fast software encryption. 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26–28, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-74617-1/pbk). Lecture Notes in Computer Science 4593, 329-348 (2007).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

How to construct sufficient conditions for hash functions. (English) Zbl 1295.94142

Nguyen, Phong Q. (ed.), Progress in cryptology – VIETCRYPT 2006. First international conference on cryptology in Vietnam, Hanoi, Vietnam, September 25–28, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-68799-3/pbk). Lecture Notes in Computer Science 4341, 243-259 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved collision search for SHA-0. (English) Zbl 1172.94591

Lai, Xuejia (ed.) et al., Advances in cryptology – ASIACRYPT 2006. 12th international conference on the theory and application of cryptology and information security, Shanghai, China, December 3–7, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49475-1/pbk). Lecture Notes in Computer Science 4284, 21-36 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved collision attack on MD4 with probability almost 1. (English) Zbl 1185.94062

Won, Dongho (ed.) et al., Information security and cryptology – ICISC 2005. 8th international conference, Seoul, Korea, December 1–2, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-33354-1/pbk). Lecture Notes in Computer Science 3935, 129-145 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

all top 5

Year of Publication

Main Field

all top 3

Software