Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2

作者: Jian Guo , San Ling , Christian Rechberger , Huaxiong Wang

DOI: 10.1007/978-3-642-17373-8_4

关键词:

摘要: … their security against preimage attacks. Our results are the best known preimage attacks on Tiger, … This way we also improve the best known preimage attacks on reduced SHA-256 and …

参考文章(65)
Moni Naor, Advances in Cryptology - EUROCRYPT 2007 Lecture Notes in Computer Science. ,vol. 4515, ,(2007) , 10.1007/978-3-540-72540-4
Christophe De Cannière, Christian Rechberger, Finding SHA-1 characteristics: general results and applications international conference on the theory and application of cryptology and information security. pp. 1- 20 ,(2006) , 10.1007/11935230_1
Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang, The Second-Preimage Attack on MD4 Cryptology and Network Security. pp. 1- 12 ,(2005) , 10.1007/11599371_1
Gaëtan Leurent, MD4 is Not One-Way fast software encryption. pp. 412- 428 ,(2008) , 10.1007/978-3-540-71039-4_26
Aggelos Kiayias, Moti Yung, Polynomial reconstruction based cryptography selected areas in cryptography. pp. 129- 133 ,(2001) , 10.1007/3-540-45537-X_10
Benny Pinkas, Thomas Schneider, Nigel P. Smart, Stephen C. Williams, Secure Two-Party Computation Is Practical international conference on the theory and application of cryptology and information security. pp. 250- 267 ,(2009) , 10.1007/978-3-642-10366-7_15
Takanori Isobe, Kyoji Shibutani, Preimage Attacks on Reduced Tiger and SHA-2 fast software encryption. pp. 139- 155 ,(2009) , 10.1007/978-3-642-03317-9_9
Yu Sasaki, Kazumaro Aoki, Finding Preimages in Full MD5 Faster Than Exhaustive Search international cryptology conference. pp. 134- 152 ,(2009) , 10.1007/978-3-642-01001-9_8
Serge Vaudenay, On the need for multipermutations: Cryptanalysis of MD4 and SAFER fast software encryption. ,vol. 1008, pp. 286- 297 ,(1994) , 10.1007/3-540-60590-8_22
John Kelsey, Bruce Schneier, Second preimages on n -bit hash functions for much less than 2 n work theory and application of cryptographic techniques. pp. 474- 490 ,(2005) , 10.1007/11426639_28