Quantum algorithms for hash preimage attacks

被引:10
|
作者
Wang, Ping [1 ]
Tian, Shengping [1 ]
Sun, Zhiwei [2 ]
Xie, Ning [1 ]
机构
[1] College of Electronics and Information Engineering, Shenzhen University, China
[2] School of Computer Engineering, Shenzhen PolyTechnic, China
来源
Quantum Engineering | 2020年 / 2卷 / 02期
关键词
D O I
10.1002/que2.36
中图分类号
学科分类号
摘要
引用
下载
收藏
相关论文
共 50 条
  • [1] Second preimage attacks on dithered hash functions
    Andreeva, Elena
    Bouillaguet, Charles
    Fouque, Pierre-Alain
    Hoch, Jonathan J.
    Kelsey, John
    Shamir, Adi
    Zimmer, Sebastien
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2008, 2008, 4965 : 270 - +
  • [2] Preimage Attacks against Variants of Very Smooth Hash
    Halunen, Kimmo
    Roning, Juha
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2010, 6434 : 251 - 266
  • [3] New Second-Preimage Attacks on Hash Functions
    Andreeva, Elena
    Bouillaguet, Charles
    Dunkelman, Orr
    Fouque, Pierre-Alain
    Hoch, Jonathan
    Shamir, Adi
    Kelsey, John
    Zimmer, Sebastien
    JOURNAL OF CRYPTOLOGY, 2016, 29 (04) : 657 - 696
  • [4] Collision and second preimage attacks on the HTBC hash function
    Ma, Bingke, 1600, Science Press (51):
  • [5] New Second-Preimage Attacks on Hash Functions
    Elena Andreeva
    Charles Bouillaguet
    Orr Dunkelman
    Pierre-Alain Fouque
    Jonathan Hoch
    John Kelsey
    Adi Shamir
    Sébastien Zimmer
    Journal of Cryptology, 2016, 29 : 657 - 696
  • [6] Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners
    Bao, Zhenzhen
    Wang, Lei
    Guo, Jian
    Gu, Dawu
    ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PART II, 2017, 10402 : 404 - 427
  • [7] Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash
    Hong, Deukjo
    Koo, Bonwook
    Kim, Woo-Hwan
    Kwon, Daesung
    INFORMATION SECURITY AND CRYPTOLOGY - ISISC 2009, 2010, 5984 : 315 - 331
  • [8] Preimage Attacks against PKC98-Hash and HAS-V
    Sasaki, Yu
    Mendel, Florian
    Aoki, Kazumaro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) : 111 - 124
  • [9] Preimage Attacks against PKC98-Hash and HAS-V
    Sasaki, Yu
    Mendel, Florian
    Aoki, Kazumaro
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 2011, 6829 : 68 - +
  • [10] Attacks on and advances in secure hash algorithms
    Kishore, Neha (nehakishore.garg@gmail.com), 1600, International Association of Engineers (43):