Quantum algorithms for hash preimage attacks

被引:10
|
作者
Wang, Ping [1 ]
Tian, Shengping [1 ]
Sun, Zhiwei [2 ]
Xie, Ning [1 ]
机构
[1] College of Electronics and Information Engineering, Shenzhen University, China
[2] School of Computer Engineering, Shenzhen PolyTechnic, China
来源
Quantum Engineering | 2020年 / 2卷 / 02期
关键词
D O I
10.1002/que2.36
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Preimage Attacks on Full-ARIRANG
    Ohtahara, Chiaki
    Okada, Keita
    Sasaki, Yu
    Shimoyama, Takeshi
    INFORMATION SECURITY AND PRIVACY, 2011, 6812 : 417 - +
  • [32] Security of Hash Functions against Attacks Using Quantum Computers
    Hosoyamada A.
    NTT Technical Review, 2023, 21 (07): : 43 - 47
  • [33] Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function
    Zou, Jian
    Wu, Wenling
    Wu, Shuang
    Dong, Le
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2014, 30 (06) : 1789 - 1806
  • [34] Preimage Attacks on Reduced-Round Stribog
    AlTawy, Riham
    Youssef, Amr M.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 109 - 125
  • [35] Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128
    Wang, Lei
    Sasaki, Yu
    Komatsubara, Wataru
    Sakiyama, Kazuo
    Ohta, Kazuo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) : 100 - 110
  • [36] Key-recovery attacks on universal hash function based MAC algorithms
    Handschuh, Helena
    Preneel, Bart
    ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 144 - +
  • [37] Preimage and collision attacks on MD2
    Knudsen, LR
    Mathiassen, JE
    FAST SOFTWARE ENCRYPTION, 2005, 3557 : 255 - 267
  • [38] Preimage Attacks on Reduced Tiger and SHA-2
    Isobe, Takanori
    Shibutani, Kyoji
    FAST SOFTWARE ENCRYPTION, 2009, 5665 : 139 - 155
  • [39] The FSR-255 Hash Function Is Not Second-Preimage Resistant
    Kontak, Marcin
    Szmidt, Janusz
    2013 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MCC), 2013,
  • [40] Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings
    Khovratovich, Dmitry
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2012, 2012, 7658 : 544 - 561