Improved preimage attack for 68-step HAS-160
D Hong, B Koo, Y Sasaki - … , Security and Cryptology–ICISC 2009: 12th …, 2010 - Springer
In this paper, we improve previous preimage attacks on hash function HAS-160, which is
standardized in Korea. We show that the last 68 steps out of 80 steps of HAS-160 can be …
standardized in Korea. We show that the last 68 steps out of 80 steps of HAS-160 can be …
Improved preimage attacks on RIPEMD-160 and HAS-160
Y Shen, G Wang - KSII Transactions on Internet and Information …, 2018 - koreascience.kr
The hash function RIPEMD-160 is a worldwide ISO/IEC standard and the hash function HAS-
160 is the Korean hash standard and is widely used in Korea. On the basis of differential …
160 is the Korean hash standard and is widely used in Korea. On the basis of differential …
A preimage attack for 52-step HAS-160
Y Sasaki, K Aoki - Information Security and Cryptology–ICISC 2008: 11th …, 2009 - Springer
In this paper, we propose preimage attacks on the hash function HAS-160, which is
standardized in Korea. We propose two approaches to generate a preimage of step-reduced …
standardized in Korea. We propose two approaches to generate a preimage of step-reduced …
Colliding message pair for 53-step HAS-160
HAS-160 is an iterated cryptographic hash function that is widely used in Korea. In this
article, we present a collision attack on the hash function HAS-160 reduced to 53-steps. The …
article, we present a collision attack on the hash function HAS-160 reduced to 53-steps. The …
Analysis of boomerang differential trails via a SAT-based constraint solver URSA
A Kircanski - Applied Cryptography and Network Security: 13th …, 2015 - Springer
Obtaining differential patterns over many rounds of a cryptographic primitive often requires
working on local differential trail analysis. In the case of boomerang and rectangle attacks …
working on local differential trail analysis. In the case of boomerang and rectangle attacks …
Collision search attack for 53-step HAS-160
HS Cho, S Park, SH Sung, A Yun - … 30-December 1, 2006. Proceedings 9, 2006 - Springer
HAS-160 is a cryptographic hash function which is designed and used widely in Korea. In
ICISC 2005, Yun et al. presented a collision search attack for the first 45 steps of HAS-160 …
ICISC 2005, Yun et al. presented a collision search attack for the first 45 steps of HAS-160 …
Cryptanalysis of round-reduced HAS-160
HAS-160 is an iterated cryptographic hash function that is standardized by the Korean
government and widely used in Korea. In this paper, we present a semi-free-start collision …
government and widely used in Korea. In this paper, we present a semi-free-start collision …
Boomerang distinguishers for full HAS-160 compression function
Y Sasaki, L Wang, Y Takasaki, K Sakiyama… - Advances in Information …, 2012 - Springer
This paper studies a boomerang-attack-based distinguisher against full steps of the
compression function of HAS-160, which is the hash function standard in Korea. The attack …
compression function of HAS-160, which is the hash function standard in Korea. The attack …
[PDF][PDF] Analysis of Modern Dedicated Cryptographic Hash Functions
K Matusiewicz - 2007 - vladimirbozovic.net
The topic of this thesis is the study of cryptographic hash functions, one of the most important
classes of primitives used in modern cryptography. The main aim is the development of new …
classes of primitives used in modern cryptography. The main aim is the development of new …
(Pseudo-) preimage attacks on step-reduced HAS-160 and RIPEMD-160
G Wang, Y Shen - … Security: 17th International Conference, ISC 2014 …, 2014 - Springer
The hash function HAS-160 is standardized by the Korean government and widely used in
Korea, and the hash function RIPEMD-160 is a worldwide ISO/IEC standard. In this paper …
Korea, and the hash function RIPEMD-160 is a worldwide ISO/IEC standard. In this paper …