Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,250,719 papers from all fields of science
Search
Sign In
Create Free Account
HAVAL
HAVAL is a cryptographic hash function. Unlike MD5, but like most modern cryptographic hash functions, HAVAL can produce hashes of different lengths…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Bent function
Comparison of cryptographic hash functions
Cryptographic hash function
Hash function security summary
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2009
2009
Selected Areas in Cryptography, 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers
Somayed Heidarvand
,
Jorge Luis Villar Santos
ACM Symposium on Applied Computing
2009
Corpus ID: 37383520
In this paper we propose a new publicly verifiable secret sharing scheme using pairings with close relations to Shoenmakers…
Expand
Highly Cited
2009
Highly Cited
2009
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
Jean-Philippe Aumasson
,
W. Meier
,
Florian Mendel
ACM Symposium on Applied Computing
2009
Corpus ID: 2880046
This paper presents preimage attacks on the hash functions 3-pass HAVAL and step-reduced MD5. Introduced in 1992 and 1991…
Expand
Highly Cited
2008
Highly Cited
2008
Preimage Attacks on 3, 4, and 5-Pass HAVAL
Yu Sasaki
,
Kazumaro Aoki
International Conference on the Theory and…
2008
Corpus ID: 16798541
This paper proposes preimage attacks on hash function HAVAL whose output length is 256 bits. This paper has three main…
Expand
2008
2008
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL
Eunjin Lee
,
D. Chang
,
Jongsung Kim
,
Jaechul Sung
,
Seokhie Hong
Fast Software Encryption Workshop
2008
Corpus ID: 19485438
In 1992, Zheng, Pieprzyk and Seberry proposed a one-way hashing algorithm called HAVAL, which compresses a message of arbitrary…
Expand
2006
2006
Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers
Thomas Johansson
,
Willi Meier
,
Frédéric Muller
Fast Software Encryption Workshop
2006
Corpus ID: 21307274
We present several attacks against the Achterbahn stream cipher, which was proposed to the eSTREAM competition. We can break the…
Expand
Highly Cited
2006
Highly Cited
2006
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)
Jongsung Kim
,
A. Biryukov
,
B. Preneel
,
Seokhie Hong
International Conference on Security and…
2006
Corpus ID: 9767707
HMAC is a widely used message authentication code and a pseudorandom function generator based on cryptographic hash functions…
Expand
2003
2003
Attacks for Finding Collision in Reduced Versions of 3-PASS and 4-PASS HAVAL
Yong-Sork Her
,
許 容碩
,
+4 authors
コウイチ サクライ
2003
Corpus ID: 5345758
HAVAL is a hash function, which was proposed by Zheng et al. HAVAL has the first flexiable variable output lengths, namely 128…
Expand
2000
2000
Cryptanalysis of reduced version of HAVAL
P. Kasselman
,
W. T. Penzhorn
2000
Corpus ID: 62226777
The first published cryptanalysis results of the HAVAL hash function are presented. A new approach is introduced which enables…
Expand
1997
1997
The SPEED Cipher
Yuliang Zheng
Financial Cryptography
1997
Corpus ID: 15341893
SPEED is a private key block cipher. It supports three variable parameters: (1) data length — the length of a plaintext…
Expand
Highly Cited
1992
Highly Cited
1992
HAVAL - A One-Way Hashing Algorithm with Variable Length of Output
Yuliang Zheng
,
J. Pieprzyk
,
J. Seberry
AUSCRYPT
1992
Corpus ID: 17463427
A one-way hashing algorithm is a deterministic algorithm that compresses an arbitrary long message into a value of specified…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required