Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,942,081 papers from all fields of science
Search
Sign In
Create Free Account
Preimage attack
Known as:
First preimage attack
, Preimage resistance
, Preimage attacks
Expand
In cryptography, a preimage attack on cryptographic hash functions tries to find a message that has a specific hash value. A cryptographic hash…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
26 relations
Birthday attack
Collision attack
Collision resistance
Cryptanalysis
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Practical (Second) Preimage Attacks on TCS_SHA-3
G. Sekar
,
Soumyadeep Bhattacharya
IACR Cryptology ePrint Archive
2013
Corpus ID: 6411828
TCS SHA-3 is a family of four cryptographic hash functions that are covered by an US patent (US 2009/0262925). The digest sizes…
Expand
2012
2012
Self-Differential Cryptanalysis of Up to 5 Rounds of SHA-3
Itai Dinur
,
O. Dunkelman
,
A. Shamir
IACR Cryptology ePrint Archive
2012
Corpus ID: 1963197
. On October 2-nd 2012 NIST announced its selection of the Keccak scheme as the new SHA-3 hash standard. In this paper we present…
Expand
2011
2011
Improved Preimage Attack on 3-Pass HAVAL
钟锦敏
,
来学嘉
,
段明
2011
Corpus ID: 125063685
HAVAL is a hash function proposed by Zheng et al.in 1992,including 3-,4-and 5-pass versions.We improve pseudo-preimage and…
Expand
2010
2010
Preimage Resistance Beyond the Birthday Bound: Double-Length Hashing Revisited
Matthias Krause
,
Frederik Armknecht
,
E. Fleischmann
IACR Cryptology ePrint Archive
2010
Corpus ID: 1842858
2010
2010
Preimage Attacks against PKC98-Hash and HAS-V
Yu Sasaki
,
Florian Mendel
,
Kazumaro Aoki
International Conference on Information Security…
2010
Corpus ID: 6056075
We propose preimage attacks against PKC98-Hash and HAS-V. PKC98-Hash is a 160-bit hash function proposed at PKC 1998, and HAS-V…
Expand
2010
2010
A Flaw in The Internal State Recovery Attack on ALPHA-MAC
Shengbao Wu
,
Mingsheng Wang
,
Zheng Yuan
IACR Cryptology ePrint Archive
2010
Corpus ID: 2507494
An distinguisher was constructed by utilizing a 2-round collision differential path of ALPHA-MAC, with about 2 chosen messages…
Expand
2009
2009
Preimage Attack on ARIRANG
Deukjo Hong
,
Woo-Hwan Kim
,
Bonwook Koo
IACR Cryptology ePrint Archive
2009
Corpus ID: 11260534
The hash function ARIRANG is one of the 1st round SHA-3 candidates. In this paper, we present preimage attacks on ARIRANG with…
Expand
2009
2009
A 2nd-Preimage Attack on AURORA-512
Yu Sasaki
IACR Cryptology ePrint Archive
2009
Corpus ID: 29198712
In this note, we present a 2nd-preimage attack on AURORA512, which is one of the candidates for SHA-3. Our attack can generate…
Expand
2009
2009
Construction of the Initial Structure for Preimage Attack of MD5
Ming Mao
,
Shaohui Chen
,
Jin Xu
International Conference on Computational…
2009
Corpus ID: 16512325
The construction of the initial structure for preimage attack of MD5 is proposed in this paper. With the help of “divide-and-rule…
Expand
2008
2008
Preimage Attack on Blender
Florian Mendel
2008
Corpus ID: 13849982
In this paper, we present a preimage attack on the hash function Blender for all output sizes. It has a complexity of about n ·2…
Expand