Keyword : preimage attack


Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist
Yu SASAKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1 ; pp. 61-71
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Based Cryptography
Keyword: 
Feistelgeneralized FeistelSP round functionhashing modesmeet-in-the-middle attackpreimage attackCamelliaCLEFIA
 Summary | Full Text:PDF(1.7MB)

Meet-in-the-Middle Preimage Attacks on Hash Modes of Generalized Feistel and Misty Schemes with SP Round Function
Dukjae MOON Deukjo HONG Daesung KWON Seokhie HONG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/08/01
Vol. E95-A  No. 8 ; pp. 1379-1389
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
preimage attackhash modeFeistel schemeMisty schemeblock cipher
 Summary | Full Text:PDF(1.7MB)

Preimage Attack on 23-Step Tiger
Lei WANG Yu SASAKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 110-120
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Function
Keyword: 
Tigerhash functionmeet-in-the-middlepreimage attackindependent chunks
 Summary | Full Text:PDF(5.8MB)