Skip to search formSkip to main contentSkip to account menu

Preimage attack

Known as: First preimage attack, Preimage resistance, Preimage attacks 
In cryptography, a preimage attack on cryptographic hash functions tries to find a message that has a specific hash value. A cryptographic hash… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
In August 2012, the Stribog hash function was selected as the new Russian cryptographic hash standard (GOST R 34.11-2012… 
2012
2012
. On October 2-nd 2012 NIST announced its selection of the Keccak scheme as the new SHA-3 hash standard. In this paper we present… 
2012
2012
Hash functions are the most widespread among all cryptographic primitives, and are currently used in multiple cryptographic… 
2010
2010
In this paper we show a quantum preimage attack on CubeHash-512-normal with complexity 2. This kind of attack is expected to cost… 
2009
2009
In this paper, we propose preimage attacks on 41-step SHA-256 and 46-step SHA-512, which drastically increase the number of… 
2009
2009
The hash function ARIRANG is one of the 1st round SHA-3 candidates. In this paper, we present preimage attacks on ARIRANG with… 
2009
2009
We present a second preimage attack on SHAMATA-512, which is a hash function of 512-bit output and one of the first round… 
2007
2007
We present a new non-interactive message authentication protocol in manual channel model (NIMAP, for short) using the weakest… 
2006
2006
CellHash [3] and SubHash [4] were suggested by J. Daemen, R. Govaerts and J. Vandewalle in 1991 and 1992. SubHash is an improved… 
1994
1994
We consider the problem of determining robot manipulation plans when sensing and control uncertainties are specified as…