Showing 1 - 1 results of 1 for search '"MD5"', query time: 0.05s Refine Results
  1. 1

    Automatic search of Meet-in-the-Middle preimage attacks on AES-like hashing by Bao, Zhenzhen, Dong, Xiaoyang, Guo, Jian, Li, Zheng, Shi, Danping, Sun, Siwei, Wang, Xiaoyun

    Published 2022
    “…The Meet-in-the-Middle (MITM) preimage attack is highly effective in breaking the preimage resistance of many hash functions, including but not limited to the full MD5, HAVAL, and Tiger, and reduced SHA-0/1/2. It was also shown to be a threat to hash functions built on block ciphers like AES by Sasaki in 2011. …”
    Get full text
    Conference Paper