Preimage attack

Known as: First preimage attack, Preimage resistance, Preimage attacks 
In cryptography, a preimage attack on cryptographic hash functions tries to find a message that has a specific hash value. A cryptographic hash… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Biometric recognition is more and more employed in authentication and access control of various applications. Biometric data are… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2011
Highly Cited
2011
We introduce a new concept in splice-and-cut attacks on hash functions, which bridges the gap between preimage attacks and a… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
2010
2010
We propose an improved preimage attack on one-block MD4 with the time complexity 2 MD4 compression function operations, as… (More)
  • table 1
  • figure 1
  • table 2
  • table 3
  • table 4
Is this relevant?
2009
2009
In this note, we present a 2nd-preimage attack on AURORA512, which is one of the candidates for SHA-3. Our attack can generate… (More)
  • figure 1
Is this relevant?
2009
2009
BioHashing generates a BioCode from a user's biometric features by projecting them onto user-specific random vectors and then… (More)
Is this relevant?
2009
2009
The hash function ARIRANG is one of the 1st round SHA-3 candidates. In this paper, we present preimage attacks on ARIRANG with… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
In this paper, we present the first cryptographic preimage attack on the full MD5 hash function. This attack, with a complexity… (More)
  • table 1
  • table 2
  • figure 1
  • table 3
  • table 4
Is this relevant?
2008
2008
In this article, we analyze the security of the GOST hash function with respect to (second) preimage resistance. The GOST hash… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2005
2005
Two proxy signcryption schemes from bilinear pairings p. 161 Constructing secure warrant-based proxy signcryption schemes p. 172… (More)
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We consider basic notions of security for cryptographic hash functions: collision resistance, preimage resistance, and second… (More)
  • figure 1
  • figure 3
Is this relevant?