How to break MD5 and other hash functions

X Wang, H Yu - Annual international conference on the theory and …, 2005 - Springer
MD5 is one of the most widely used cryptographic hash functions nowadays. It was
designed in 1992 as an improvement of MD4, and its security was widely studied since then …

Finding collisions in the full SHA-1

X Wang, YL Yin, H Yu - Advances in Cryptology–CRYPTO 2005: 25th …, 2005 - Springer
LNCS 3621 - Finding Collisions in the Full SHA-1 Page 1 Finding Collisions in the Full SHA-1
Xiaoyun Wang1,⋆, Yiqun Lisa Yin2, and Hongbo Yu3 1 Shandong University, Jinan 250100 …

Cryptanalysis of the Hash Functions MD4 and RIPEMD

X Wang, X Lai, D Feng, H Chen, X Yu - … on the Theory and Applications of …, 2005 - Springer
MD4 is a hash function developed by Rivest in 1990. It serves as the basis for most of the
dedicated hash functions such as MD5, SHAx, RIPEMD, and HAVAL. In 1996, Dobbertin …

Efficient collision search attacks on SHA-0

X Wang, H Yu, YL Yin - Advances in Cryptology–CRYPTO 2005: 25th …, 2005 - Springer
LNCS 3621 - Efficient Collision Search Attacks on SHA-0 Page 1 Efficient Collision Search
Attacks on SHA-0 Xiaoyun Wang1,⋆, Hongbo Yu2, and Yiqun Lisa Yin3 1 Shandong University …

[PDF][PDF] Cryptanalysis of Hash functions of the MD4-family

M Daum - 2005 - d-nb.info
Hash functions—or rather cryptographic hash functions—constitute an important primitive
necessary in many cryptographic applications. They are used to compress messages—to be …

ASIC-hardware-focused comparison for hash functions MD5, RIPEMD-160, and SHS

A Satoh, T Inoue - Integration, 2007 - Elsevier
The hash functions MD5, RIPEMD-160, and SHA-1/224/256/384/512 were implemented by
using a 0.13-μm CMOS standard cell library with two synthesis options, area and speed …

Musings on the wang et al. md5 collision

P Hawkes, M Paddon, GG Rose - Cryptology ePrint Archive, 2004 - eprint.iacr.org
Wang et al. caused great excitement at CRYPTO2004 when they announced a collision for
MD5~\cite {R92_MD5}. This paper is examines the internal differences and conditions …

[图书][B] Advances in Cryptology-CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings

V Shoup - 2005 - books.google.com
These are the proceedings of Crypto 2005, the 25th Annual International Cr-tology
Conference. The conference was sponsored by the International Assoc-tion for Cryptologic …

[PDF][PDF] Attacks on and advances in secure hash algorithms

N Kishore, B Kapoor - IAENG Int. J. Comput. Sci, 2016 - researchgate.net
In today's information-based society, encryption along with the techniques for authentication
and integrity are key to the security of information. Cryptographic hashing algorithms, such …

Finding good differential patterns for attacks on SHA-1

K Matusiewicz, J Pieprzyk - … Workshop, WCC 2005, Bergen, Norway, March …, 2006 - Springer
In this paper we analyse properties of the message expansion algorithm of SHA-1 and
describe a method of finding differential patterns that may be used to attack reduced …