How to break MD5 and other hash functions

X Wang, H Yu - Annual international conference on the theory and …, 2005 - Springer
MD5 is one of the most widely used cryptographic hash functions nowadays. It was
designed in 1992 as an improvement of MD4, and its security was widely studied since then …

Cryptanalysis of the Hash Functions MD4 and RIPEMD

X Wang, X Lai, D Feng, H Chen, X Yu - … on the Theory and Applications of …, 2005 - Springer
MD4 is a hash function developed by Rivest in 1990. It serves as the basis for most of the
dedicated hash functions such as MD5, SHAx, RIPEMD, and HAVAL. In 1996, Dobbertin …

Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work

J Kelsey, B Schneier - Advances in Cryptology–EUROCRYPT 2005: 24th …, 2005 - Springer
We expand a previous result of Dean [Dea99] to provide a second preimage attack on all n-
bit iterated hash functions with Damgård-Merkle strengthening and n-bit intermediate states …

A failure-friendly design principle for hash functions

S Lucks - Advances in Cryptology-ASIACRYPT 2005: 11th …, 2005 - Springer
This paper reconsiders the established Merkle-Damgård design principle for iterated hash
functions. The internal state size w of an iterated n-bit hash function is treated as a security …

Implementation of the SHA-2 hash family standard using FPGAs

N Sklavos, O Koufopavlou - The journal of Supercomputing, 2005 - Springer
The continued growth of both wired and wireless communications has triggered the
revolution for the generation of new cryptographic algorithms. SHA-2 hash family is a new …

[PDF][PDF] Cryptanalysis of Hash functions of the MD4-family

M Daum - 2005 - d-nb.info
Hash functions—or rather cryptographic hash functions—constitute an important primitive
necessary in many cryptographic applications. They are used to compress messages—to be …

Hardware implementation analysis of the MD5 hash algorithm

K Jarvinen, M Tommiska, J Skytta - Proceedings of the 38th …, 2005 - ieeexplore.ieee.org
Hardware implementation aspects of the MD5 hash algorithm are discussed in this paper. A
general architecture for MD5 is proposed and several implementations are presented. An …

[图书][B] Codes: the guide to secrecy from ancient to modern times

RA Mollin - 2005 - taylorfrancis.com
From the Rosetta Stone to public-key cryptography, the art and science of cryptology has
been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to …

A chaos-based cryptographic hash function for message authentication

HS Kwok, WKS Tang - International Journal of Bifurcation and …, 2005 - World Scientific
In this paper, a chaos-based cryptographic hash function is proposed for message
authentication where a fixed length message digest can be generated from any messages …

Security analysis of a 2/3-rate double length compression function in the black-box model

M Nandi, W Lee, K Sakurai, S Lee - … , FSE 2005, Paris, France, February 21 …, 2005 - Springer
In this paper, we propose a 2/3-rate double length compression function and study its
security in the black-box model. We prove that to get a collision attack for the compression …