Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,393,623 papers from all fields of science
Search
Sign In
Create Free Account
Preimage attack
Known as:
First preimage attack
, Preimage resistance
, Preimage attacks
Expand
In cryptography, a preimage attack on cryptographic hash functions tries to find a message that has a specific hash value. A cryptographic hash…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
26 relations
Birthday attack
Collision attack
Collision resistance
Cryptanalysis
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing
Zhenzhen Bao
,
Xiaoyang Dong
,
+4 authors
Xiaoyun Wang
IACR Cryptology ePrint Archive
2020
Corpus ID: 216554956
. The Meet-in-the-Middle (MITM) preimage attack is highly effective in breaking the preimage resistance of many hash functions…
Expand
Highly Cited
2014
Highly Cited
2014
A Quantum Algorithm for Computing Isogenies between Supersingular Elliptic Curves
Jean-François Biasse
,
David Jao
,
Anirudh Sankar
International Conference on Cryptology in India
2014
Corpus ID: 17726824
In this paper, we describe a quantum algorithm for computing an isogeny between any two supersingular elliptic curves defined…
Expand
Highly Cited
2009
Highly Cited
2009
Preimages for Step-Reduced SHA-2
Jian Guo
,
K. Matusiewicz
IACR Cryptology ePrint Archive
2009
Corpus ID: 30246151
In this paper, we present preimage attacks on up to 43-step SHA-256 (around 67% of the total 64 steps) and 46-step SHA-512…
Expand
2009
2009
Security of Cyclic Double Block Length Hash Functions
E. Fleischmann
,
M. Gorski
,
S. Lucks
IMA Conference on Cryptography and Coding
2009
Corpus ID: 18680237
We provide a proof of security for a huge class of double block length hash function that we will call Cyclic-DM . Using this…
Expand
2009
2009
Inverse operation and preimage attack on BioHashing
Yongjin Lee
,
Yun-Su Chung
,
Kiyoung Moon
IEEE Workshop on Computational Intelligence in…
2009
Corpus ID: 16233149
BioHashing generates a BioCode from a user's biometric features by projecting them onto user-specific random vectors and then…
Expand
Highly Cited
2009
Highly Cited
2009
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
Jean-Philippe Aumasson
,
W. Meier
,
Florian Mendel
ACM Symposium on Applied Computing
2009
Corpus ID: 2880046
This paper presents preimage attacks on the hash functions 3-pass HAVAL and step-reduced MD5. Introduced in 1992 and 1991…
Expand
Highly Cited
2008
Highly Cited
2008
Second Preimage Attacks on Dithered Hash Functions
E. Andreeva
,
Charles Bouillaguet
,
+4 authors
Sébastien Zimmer
International Conference on the Theory and…
2008
Corpus ID: 12844017
We develop a new generic long-message second preimage attack, based on combining the techniques in the second preimage attacks of…
Expand
2008
2008
Preimage Attacks on Step-Reduced MD5
Yu Sasaki
,
Kazumaro Aoki
Australasian Conference on Information Security…
2008
Corpus ID: 36977896
In this paper, we propose preimage attacks on step-reduced MD5. We show that a preimage of a 44-step MD5 can be computed to a…
Expand
Highly Cited
2008
Highly Cited
2008
Preimage Attacks on 3, 4, and 5-Pass HAVAL
Yu Sasaki
,
Kazumaro Aoki
International Conference on the Theory and…
2008
Corpus ID: 16798541
This paper proposes preimage attacks on hash function HAVAL whose output length is 256 bits. This paper has three main…
Expand
Highly Cited
2005
Highly Cited
2005
The Second-Preimage Attack on MD4
Hongbo Yu
,
Gaoli Wang
,
Guoyan Zhang
,
Xiaoyun Wang
Cryptology and Network Security
2005
Corpus ID: 2066971
In Eurocrypt’05, Wang et al. presented new techniques to find collisions of Hash function MD4. The techniques are not only…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE