Cited By
View all- El Ksimi ALeghris C(2018)Towards a New Algorithm to Optimize IPv6 Neighbor Discovery Security for Small Objects NetworksSecurity and Communication Networks10.1155/2018/18164622018Online publication date: 6-Jun-2018
This paper proposes a preimage attack on SM3 hash function reduced to 30 steps. SM3 is an iterated hash function based on the Merkle-Damgård design. It is a hash function used in applications such as the electronic certification service system in China. ...
The Grøstl hash function is one of the 5 final round candidates of the SHA-3 competition hosted by NIST. In this paper, we study the preimage resistance of the Grøstl hash function. We propose pseudo preimage attacks on Grøstl hash function for both 256-...
HAS-160 is a Korean industry standard for hash functions. It has a similar structure to SHA-1 and produces a 160-bit hash value. In this paper, we propose improved preimage attacks against step-reduced HAS-160 using the differential meet-in-the-middle ...
Elsevier North-Holland, Inc.
United States