Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
170 | Xiaoyun Wang 0001, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu |
Cryptanalysis of the Hash Functions MD4 and RIPEMD. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
142 | Hans Dobbertin |
Cryptanalysis of MD4. |
J. Cryptol. |
1998 |
DBLP DOI BibTeX RDF |
Dedicated hash functions, RIPEMD, Dedicated hash functions, RIPEMD, Collisions, Collisions, Key words, MD5, MD5, MD4, MD4 |
138 | Ronald L. Rivest |
The MD4 Message Digest Algorithm. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
132 | Gaëtan Leurent |
MD4 is Not One-Way. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash function, preimage, MD4, one-way |
132 | Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen |
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
collisions, MD5, key-recovery, HMAC, MD4, NMAC, differential path |
123 | Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro |
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Challenge and Response, Prefix, Impossible Differential Attack, Hash Function, Hybrid, MD4, Local Collision |
106 | Christophe Debaert, Henri Gilbert |
The RIPEMD and RIPEMD Improved Variants of MD4 Are Not Collision Free. |
FSE |
2001 |
DBLP DOI BibTeX RDF |
|
100 | Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro |
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. |
EUROCRYPT |
2008 |
DBLP DOI BibTeX RDF |
MD5, key-recovery, HMAC, differential attack, MD4, NMAC, near-collision |
99 | Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede |
Design Methodology for Throughput Optimum Architectures of Hash Algorithms of the MD4-class. |
J. Signal Process. Syst. |
2008 |
DBLP DOI BibTeX RDF |
Architecture design methodology, MD4-based hash algorithm, SHA1, RIPEMD-160, Iteration bound analysis, DFG (Data Flow Graph) transformation, Throughput optimization, MD5 |
90 | Yusuke Naito 0001, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta |
Improved Collision Attack on MD4 with Probability Almost 1. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
|
90 | Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang 0001 |
The Second-Preimage Attack on MD4. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
collision differential path, weak message, Hash function, second-preimage |
90 | Burton S. Kaliski Jr. |
The MD4 Message Digest Algorithm (Abstract). |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
84 | Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro |
New Message Difference for MD4. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
Message Difference, Hash Function, Collision Attack, MD4, Local Collision, Differential Path |
80 | Eli Biham |
New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
74 | Hongbo Yu, Xiaoyun Wang 0001 |
Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
multi-collision, multi-near-collision, Hash function, sufficient condition, differential path |
64 | Tim Güneysu, Christof Paar, Sven Schäge |
Efficient Hash Collision Search Strategies on Special-Purpose Hardware. |
WEWoRC |
2007 |
DBLP DOI BibTeX RDF |
Crypto Attacks, Hash functions, Special-purpose Hardware |
58 | Martin Schläffer, Elisabeth Oswald |
Searching for Differential Paths in MD4. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
|
58 | Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong |
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract). |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
58 | Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee 0002 |
On the Security of Encryption Modes of MD4, MD5 and HAVAL. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
|
58 | Bert den Boer, Antoon Bosselaers |
An Attack on the Last Two Rounds of MD4. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
52 | Gaëtan Leurent |
Message Freedom in MD4 and MD5 Collisions: Application to APOP. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
message modification, meaningful collisions, APOP security, Hash function, MD5, MD4 |
51 | Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro |
Near-Collision Attacks on MD4: Applied to MD4-Based Protocols. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2009 |
DBLP DOI BibTeX RDF |
|
51 | Donghoon Chang, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 |
Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths. |
IACR Cryptol. ePrint Arch. |
2008 |
DBLP BibTeX RDF |
|
42 | Lei Wang 0031, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta |
Bit-Free Collision: Application to APOP Attack. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
bit-free collision, APOP, hash function, MD5, MD4 |
42 | Stephen Pellicer, Yi Pan 0001, Minyi Guo |
Distributed MD4 Password Hashing with Grid Computing Package BOINC. |
GCC |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Debapratim De, Abishek Kumarasubramanian, Ramarathnam Venkatesan |
Inversion Attacks on Secure Hash Functions Using satSolvers. |
SAT |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Lars R. Knudsen |
SMASH - A Cryptographic Hash Function. |
FSE |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Xiaoyun Wang 0001, Hongbo Yu |
How to Break MD5 and Other Hash Functions. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Lars R. Knudsen, Bart Preneel |
Fast and Secure Hashing Based on Codes. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
32 | Antoon Bosselaers, René Govaerts, Joos Vandewalle |
Fast Hashing on the Pentium. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
Pentium processor, Parallel implementation, Software performance, Cryptographic hash functions |
32 | Bert den Boer, Antoon Bosselaers |
Collisions for the Compressin Function of MD5. |
EUROCRYPT |
1993 |
DBLP DOI BibTeX RDF |
|
26 | Oleg Zaikin 0002 |
Inverting 43-step MD4 via Cube-and-Conquer. |
IJCAI |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Irina Gribanova, Alexander A. Semenov |
Constructing a Set of Weak Values for Full-round MD4 Hash Function. |
MIPRO |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Irina Gribanova, Alexander A. Semenov |
Using Automatic Generation of Relaxation Constraints to Improve the Preimage Attack on 39-step MD4. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
26 | Irina Gribanova, Alexander A. Semenov |
Using automatic generation of relaxation constraints to improve the preimage attack on 39-step MD4. |
MIPRO |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Yongpeng Zhou, Gaoli Wang |
改进的MD4有意义碰撞攻击 (Improved Meaningful Collision Attack on MD4). |
计算机科学 |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Florian Legendre, Gilles Dequen, Michaël Krajecki |
Logical Reasoning to Detect Weaknesses About SHA-1 and MD4/5. |
IACR Cryptol. ePrint Arch. |
2014 |
DBLP BibTeX RDF |
|
26 | Marko Caric |
Finding collisions for MD4 hash algorithm using hybrid algorithm. |
IACR Cryptol. ePrint Arch. |
2014 |
DBLP BibTeX RDF |
|
26 | Gaoli Wang |
Collision Attack on the Full Extended MD4 and Pseudo-Preimage Attack on RIPEMD. |
J. Comput. Sci. Technol. |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Yu Sasaki |
Boomerang Distinguishers on MD4-Based Hash Functions: First Practical Results on Full 5-Pass HAVAL Compression Function. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Jinmin Zhong, Xuejia Lai |
Improved preimage attack on one-block MD4. |
J. Syst. Softw. |
2012 |
DBLP DOI BibTeX RDF |
|
26 | |
MD4 Hash Function. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Nicky Mouha |
MD4-MD5. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Sean Turner, Lily Chen |
MD4 to Historic Status. |
RFC |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Yu Sasaki |
Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL. |
Selected Areas in Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Gaoli Wang |
Collision Attack for the Hash Function Extended MD4. |
ICICS |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Kazumaro Aoki, Noboru Kunihiro |
Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Jinmin Zhong, Xuejia Lai |
Improved Preimage Attack on One-block MD4. |
IACR Cryptol. ePrint Arch. |
2010 |
DBLP BibTeX RDF |
|
26 | Jian Guo 0001, San Ling, Christian Rechberger, Huaxiong Wang |
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. |
IACR Cryptol. ePrint Arch. |
2010 |
DBLP BibTeX RDF |
|
26 | Jian Guo 0001, San Ling, Christian Rechberger, Huaxiong Wang |
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Yu Sasaki, Lei Wang 0031, Noboru Kunihiro, Kazuo Ohta |
New Message Differences for Collision Attacks on MD4 and MD5. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Kazumaro Aoki, Yu Sasaki |
Preimage Attacks on One-Block MD4, 63-Step MD5 and More. |
Selected Areas in Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Yu Sasaki, Yusuke Naito 0001, Noboru Kunihiro, Kazuo Ohta |
Improved Collision Attacks on MD4 and MD5. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen |
Automatic Search of Differential Path in MD4. |
IACR Cryptol. ePrint Arch. |
2007 |
DBLP BibTeX RDF |
|
26 | Hongbo Yu, Xiaoyun Wang 0001 |
MultiCollision Attack on the Compression Functions of MD4 and 3-Pass HAVAL. |
IACR Cryptol. ePrint Arch. |
2007 |
DBLP BibTeX RDF |
|
26 | Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong |
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
26 | Antoon Bosselaers |
Md4-Md5. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee 0002 |
On the Security of Encryption Modes of MD4, MD5 and HAVAL. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
26 | Yusuke Naito 0001, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta |
Improved Collision Attack on MD4. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
26 | Magnus Daum |
Cryptanalysis of Hash functions of the MD4-family. |
|
2005 |
RDF |
|
26 | Xiaoyun Wang 0001, Dengguo Feng, Xuejia Lai, Hongbo Yu |
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. |
IACR Cryptol. ePrint Arch. |
2004 |
DBLP BibTeX RDF |
|
26 | Sandra Dominikus |
A hardware implementation of MD4-family hash algorithms. |
ICECS |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Hans Dobbertin |
The First Two Rounds of MD4 are Not One-Way. |
FSE |
1998 |
DBLP DOI BibTeX RDF |
|
26 | M. Bhaskar Sherigar, A. S. Mahadevan, K. Senthil Kumar, David S. Sumam |
A Pipelined Parallel Processor to Implement MD4 Message Digest Algorithm on Xilinx FPGA. |
VLSI Design |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Hans Dobbertin |
Cryptanalysis of MD4. |
FSE |
1996 |
DBLP DOI BibTeX RDF |
|
26 | Serge Vaudenay |
On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER. |
FSE |
1994 |
DBLP DOI BibTeX RDF |
|
26 | Ronald L. Rivest |
The MD4 Message-Digest Algorithm. |
RFC |
1992 |
DBLP DOI BibTeX RDF |
|
26 | Ronald L. Rivest |
MD4 Message Digest Algorithm. |
RFC |
1990 |
DBLP DOI BibTeX RDF |
|
16 | Eugene Y. Vasserman, Nicholas Hopper, James Tyra |
Silent Knock : practical, provably undetectable authentication. |
Int. J. Inf. Sec. |
2009 |
DBLP DOI BibTeX RDF |
Covert authentication, Cryptography, Provable security, Formal models |
16 | Takanori Isobe 0001, Kyoji Shibutani |
Preimage Attacks on Reduced Tiger and SHA-2. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
SHA-512, hash function, preimage attack, second preimage attack, meet-in-the-middle, SHA-256, Tiger |
16 | Yu Sasaki, Kazumaro Aoki |
Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
RIPEMD, double branch, preimage, meet-in-the-middle |
16 | Praveen Gauravaram, Lars R. Knudsen |
On Randomizing Hash Functions to Strengthen the Security of Digital Signatures. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Davies-Meyer, RMX, Digital signatures, Hash functions |
16 | Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
Analysis of the Hash Function Design Strategy Called SMASH. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
Attacking Reduced Round SHA-256. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Christian Rechberger, Vincent Rijmen |
On Authentication with HMAC and Non-random Properties. |
Financial Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Florian Mendel, Vincent Rijmen |
Weaknesses in the HAS-V Compression Function. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Kazuhiro Suzuki, Kaoru Kurosawa |
How to Find Many Collisions of 3-Pass HAVAL. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
hash function, collision, differential attack, HAVAL |
16 | Eugene Y. Vasserman, Nicholas Hopper, John Laxson, James Tyra |
SilentKnock: Practical, Provably Undetectable Authentication. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Ahto Buldas, Sven Laur |
Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Martin Feldhofer, Christian Rechberger |
A Case Against Currently Used Hash Functions in RFID Protocols. |
OTM Workshops (1) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Scott Contini, Yiqun Lisa Yin |
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Ilya Mironov, Lintao Zhang |
Applications of SAT Solvers to Cryptanalysis of Hash Functions. |
SAT |
2006 |
DBLP DOI BibTeX RDF |
|
16 | John Kelsey, Stefan Lucks |
Collisions and Near-Collisions for Reduced-Round Tiger. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
hash function, attack, collisions, Tiger |
16 | Shaoquan Jiang |
Efficient Primitives from Exponentiation in Zp. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Donghoon Chang, Kishan Chand Gupta, Mridul Nandi |
RC4-Hash: A New Hash Function Based on RC4. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Hash Function, Collision Attack, RC4, Preimage Attack |
16 | Yu Sasaki, Yusuke Naito 0001, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta |
How to Construct Sufficient Conditions for Hash Functions. |
VIETCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
Impact of Rotations in SHA-1 and Related Hash Functions. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
Breaking a New Hash Function Design Strategy Called SMASH. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
SMASH, cryptanalysis, hash functions, collision |
16 | Dejan Jovanovic, Predrag Janicic |
Logical Analysis of Hash Functions. |
FroCoS |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Esam Khan, M. Watheq El-Kharashi, Fayez Gebali, Mostafa I. H. Abd-El-Barr |
An FPGA Design of a Unified Hash Engine for IPSec Authentication. |
IWSOC |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Bart Van Rompay, Alex Biryukov, Bart Preneel, Joos Vandewalle |
Cryptanalysis of 3-Pass HAVAL. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Sang-Uk Shin, Kyung Hyune Rhee, DaeHyun Ryu, Sangjin Lee |
A New Hash Function Based on MDx-Family and Its Application to MAC. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
16 | Antoon Bosselaers, René Govaerts, Joos Vandewalle |
SHA: A Design for Parallel Architectures? |
EUROCRYPT |
1997 |
DBLP DOI BibTeX RDF |
multiple-issue architectures, instruction-level parallelism, Cryptographic hash functions, critical path analysis |
16 | Mihir Bellare, Phillip Rogaway |
Collision-Resistant Hashing: Towards Making UOWHFs Practical. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
16 | Bart Preneel, Paul C. van Oorschot |
MDx-MAC and Building Fast MACs from Hash Functions. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|