A (Second) Preimage Attack on the GOST Hash Function
- 18 July 2008
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableThis publication has 12 references indexed in Scilit:
- A Study of the MD5 Attacks: Insights and ImprovementsLecture Notes in Computer Science, 2006
- Finding SHA-1 Characteristics: General Results and ApplicationsLecture Notes in Computer Science, 2006
- Second Preimages for SMASHLecture Notes in Computer Science, 2006
- Preimage and Collision Attacks on MD2Lecture Notes in Computer Science, 2005
- Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOSTLecture Notes in Computer Science, 2004
- Multicollisions in Iterated Hash Functions. Application to Cascaded ConstructionsLecture Notes in Computer Science, 2004
- How easy is collision search. New results and applications to DESPublished by Springer Science and Business Media LLC ,2001
- Advanced Slide AttacksLecture Notes in Computer Science, 2000
- GOST 34.10—A brief overview of Russia's DSAComputers & Security, 1996
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DESLecture Notes in Computer Science, 1996