Skip to search formSkip to main contentSkip to account menu

Preimage attack

Known as: First preimage attack, Preimage resistance, Preimage attacks 
In cryptography, a preimage attack on cryptographic hash functions tries to find a message that has a specific hash value. A cryptographic hash… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
TCS SHA-3 is a family of four cryptographic hash functions that are covered by an US patent (US 2009/0262925). The digest sizes… 
2012
2012
. On October 2-nd 2012 NIST announced its selection of the Keccak scheme as the new SHA-3 hash standard. In this paper we present… 
2011
2011
HAVAL is a hash function proposed by Zheng et al.in 1992,including 3-,4-and 5-pass versions.We improve pseudo-preimage and… 
2010
2010
We propose preimage attacks against PKC98-Hash and HAS-V. PKC98-Hash is a 160-bit hash function proposed at PKC 1998, and HAS-V… 
2010
2010
An distinguisher was constructed by utilizing a 2-round collision differential path of ALPHA-MAC, with about 2 chosen messages… 
2009
2009
The hash function ARIRANG is one of the 1st round SHA-3 candidates. In this paper, we present preimage attacks on ARIRANG with… 
2009
2009
In this note, we present a 2nd-preimage attack on AURORA512, which is one of the candidates for SHA-3. Our attack can generate… 
2009
2009
The construction of the initial structure for preimage attack of MD5 is proposed in this paper. With the help of “divide-and-rule… 
2008
2008
In this paper, we present a preimage attack on the hash function Blender for all output sizes. It has a complexity of about n ·2…