Preimage attacks on 3, 4, and 5-pass HAVAL

Y Sasaki, K Aoki - Advances in Cryptology-ASIACRYPT 2008: 14th …, 2008 - Springer
attack by a few bits (strategy 1). Second, we consider another strategy that can find a preimages
of 3-, 4-, and 5-pass HAVALHAVAL, we find the best preimage attack so far on 3-pass …

Preimage attacks on 3-pass HAVAL and step-reduced MD5

JP Aumasson, W Meier, F Mendel - … 14-15, Revised Selected Papers 15, 2009 - Springer
… presents preimage attacks on the hash functions 3-pass HAVAL … collision attacks, but no
preimage attack. We describe two … Non-randomness of the full 4 and 5-pass HAVAL. In: Blundo, …

Improved preimage attack on 3-pass HAVAL

J Zhong, X Lai, M Duan - Journal of Shanghai Jiaotong University …, 2011 - Springer
… [18] presented the preimage attacks on 3-pass HAVAL at the … [19] showed the preimage
attacks on 3, 4 and 5-pass HAVAL… pseudo-preimage and preimage attacks on 3-pass HAVAL, as …

Second preimage attack on 5-pass HAVAL and partial key-recovery attack on HMAC/NMAC-5-pass HAVAL

G Wang, S Wang - Progress in Cryptology–AFRICACRYPT 2009: Second …, 2009 - Springer
attack on 5-pass HAVAL, but no second preimage attack. In this paper, we present a second
preimage differential path for 5-pass HAVALpreimage differential path for 5-pass HAVAL

An improved preimage attack against HAVAL-3

J Guo, C Su, WS Yap - Information Processing Letters, 2015 - Elsevier
attacks, we improve the preimage attacks against HAVAL-3 … with the best known attack
proposed by Sasaki and Aoki in … attacks [27], [24] apply to 256-bit variant of 3-, 4-, and 5-pass

Meet-in-the-middle preimage attacks revisited new results on MD5 and HAVAL

Y Sasaki, W Komatsubara, Y Sakai… - … on Security and …, 2013 - ieeexplore.ieee.org
preimage attack on 5-pass HAVAL from 151 steps to 158 steps, and present the first preimage
attack with a single block message for 3-… previous preimage attack on 5-pass HAVAL from …

A preimage attack for 52-step HAS-160

Y Sasaki, K Aoki - … , Seoul, Korea, December 3-5, 2008, Revised Selected …, 2009 - Springer
attack [13], and attacked the full-round of HAVAL-3, HAVAL-4, and the step-reduced HAVAL-…
Since a local collision of HAVAL can be formed by only changing two message words and f-…

Meet-in-the-middle attacks using output truncation in 3-pass HAVAL

Y Sasaki - … Security: 12th International Conference, ISC 2009 …, 2009 - Springer
preimage and pseudo-preimage attacks on short output lengths of the hash function 3-pass
HAVAL, … We tried to apply our techniques to 4-pass and 5-pass HAVAL and found that they …

Comprehensive preimage security evaluations on Rijndael-based hashing

T Zhang - International Conference on Applied Cryptography and …, 2023 - Springer
… The Meet-in-the-Middle (MITM) attack is one of the most powerful cryptanalysis techniques,
as seen by its use in preimage attacks on MD4, MD5, Tiger, HAVAL, and Haraka-512 v2 …

Meet-in-the-middle preimage attacks on AES hashing modes and an application to whirlpool

Y Sasaki - IEICE Transactions on Fundamentals of Electronics …, 2013 - search.ieice.org
preimage attacks on these constructions, while most of previous work focused their attention
on collision attacks … approach has been applied to many hash functions such as HAVAL [33]…