Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,399,336 papers from all fields of science
Search
Sign In
Create Free Account
Preimage attack
Known as:
First preimage attack
, Preimage resistance
, Preimage attacks
Expand
In cryptography, a preimage attack on cryptographic hash functions tries to find a message that has a specific hash value. A cryptographic hash…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
26 relations
Birthday attack
Collision attack
Collision resistance
Cryptanalysis
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Preimage Attacks on Reduced-Round Stribog
Riham Altawy
,
A. Youssef
International Conference on Cryptology in Africa
2014
Corpus ID: 9950670
In August 2012, the Stribog hash function was selected as the new Russian cryptographic hash standard (GOST R 34.11-2012…
Expand
2012
2012
Self-Differential Cryptanalysis of Up to 5 Rounds of SHA-3
Itai Dinur
,
O. Dunkelman
,
A. Shamir
IACR Cryptology ePrint Archive
2012
Corpus ID: 1963197
. On October 2-nd 2012 NIST announced its selection of the Keccak scheme as the new SHA-3 hash standard. In this paper we present…
Expand
2012
2012
A novel secure hash algorithm for public key digital signature schemes
Thulasimani Lakshmanan
,
M. Madheswaran
˜The œinternational Arab journal of information…
2012
Corpus ID: 8042355
Hash functions are the most widespread among all cryptographic primitives, and are currently used in multiple cryptographic…
Expand
2010
2010
Quantum Preimage and Collision Attacks on CubeHash
G. Leurent
IACR Cryptology ePrint Archive
2010
Corpus ID: 17639319
In this paper we show a quantum preimage attack on CubeHash-512-normal with complexity 2. This kind of attack is expected to cost…
Expand
2009
2009
Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512
Yu Sasaki
,
Lei Wang
,
Kazumaro Aoki
IACR Cryptology ePrint Archive
2009
Corpus ID: 277136
In this paper, we propose preimage attacks on 41-step SHA-256 and 46-step SHA-512, which drastically increase the number of…
Expand
2009
2009
Preimage Attack on ARIRANG
Deukjo Hong
,
Woo-Hwan Kim
,
Bonwook Koo
IACR Cryptology ePrint Archive
2009
Corpus ID: 11260534
The hash function ARIRANG is one of the 1st round SHA-3 candidates. In this paper, we present preimage attacks on ARIRANG with…
Expand
2009
2009
Second Preimage Attack on SHAMATA-512
K. Ideguchi
,
Dai Watanabe
International Conference on Cryptology in India
2009
Corpus ID: 16149682
We present a second preimage attack on SHAMATA-512, which is a hash function of 512-bit output and one of the first round…
Expand
2007
2007
Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions
Reza Reyhanitabar
,
Shuhong Wang
,
R. Safavi-Naini
Australasian Conference on Information Security…
2007
Corpus ID: 12325838
We present a new non-interactive message authentication protocol in manual channel model (NIMAP, for short) using the weakest…
Expand
2006
2006
Preimage Attacks on CellHash, SubHash and Strengthened Versions of CellHash and SubHash
D. Chang
IACR Cryptology ePrint Archive
2006
Corpus ID: 5252209
CellHash [3] and SubHash [4] were suggested by J. Daemen, R. Govaerts and J. Vandewalle in 1991 and 1992. SubHash is an improved…
Expand
1994
1994
An objective-based stochastic framework for manipulation planning
S. LaValle
,
S. Hutchinson
IEEE/RJS International Conference on Intelligent…
1994
Corpus ID: 5904631
We consider the problem of determining robot manipulation plans when sensing and control uncertainties are specified as…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required