Sciweavers

ASIACRYPT
2010
Springer
13 years 10 months ago
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
We revisit narrow-pipe designs that are in practical use, and their security against preimage attacks. Our results are the best known preimage attacks on Tiger, MD4, and reduced SH...
Jian Guo, San Ling, Christian Rechberger, Huaxiong...
ASIACRYPT
2010
Springer
13 years 10 months ago
The Degree of Regularity of HFE Systems
Vivien Dubois, Nicolas Gama