×
In this paper we provide first cryptanalytic results for MJH. We show that a collision attack on MJH has the time com- plexity below the birthday bound. When ...
We give some attacks on the DBL hash modes MDC-4 and MJH. Our preimage attack on the MDC-4 hash function requires the time complexity O(23n/2) for the block ...
Our preimage attack on the hash function of MDC-4 scheme requires the time complexity 23n/2, which is significantly improved compared to the previous results.
We give some attacks on the DBL hashmodesMDC-4 and MJH. Our preimage attack on the MDC-4 hash function requires the time complexity O(23n/2) for the block ...
Summary: We give some attacks on the DBL hash modes MDC-4 and MJH. Our preimage attack on the MDC-4 hash function requires the time complexity O(23n/2) for the ...
Cryptanalysis of Double-Block-Length Hash Modes MDC-4 and MJH ; Optimal Collision Security in Double Block Length Hashing with Single Length Key. Mennink B.
We give some attacks on the DBL hash modes MDC-4 and MJH. Our preimage attack on the MDC-4 hash function requires the time complexity O(23n/2) for the block ...
In this paper, we make attacks on DBL (Double-Block-Length) hash modes of block ciphers with n-bit key and n-bit block. Our preimage attack on the hash function ...
Quantum cryptanalysis of the full AES-256-based Davies–Meyer, Hirose and MJH hash functions · Cryptanalysis of double-block-length hash modes MDC-4 and MJH.
MDC-2 and MDC-4 are constructions for Hash Functions based on a Block Cipher, where the length in bits of the hash result is twice the block length of the block ...