-
1
-
2Published 2009Table of Contents: “…Hash Functions -- Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC…”
Full Text via HEAL-Link
Electronic eBook -
3Published 2008Table of Contents: “… Permutation -- Hash Function Cryptanalysis (I) -- Second Preimage Attack on 3-Pass HAVAL and Partial Key…”
Full Text via HEAL-Link
Electronic eBook -
4Published 2016Table of Contents: “… Liu, Timm Heinbokel, and Stefan G. Tullius -- New frontiers and new technologies / Haval Shirwan…”
Full Text via HEAL-Link
eBook -
5Published 2007Table of Contents: “… for the SHA-2 Hash Family -- Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL…”
Full Text via HEAL-Link
Electronic eBook -
6Published 2006Table of Contents: “… Functions I -- Cryptanalysis of the Full HAVAL with 4 and 5 Passes -- Collisions and Near-Collisions…”
Full Text via HEAL-Link
Electronic eBook -
7Published 2006Table of Contents: “… -- Symmetric Key Cryptanalysis and Randomness -- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA…”
Full Text via HEAL-Link
Electronic eBook -
8Published 2009Table of Contents: “… on 3-Pass HAVAL and Step-Reduced MD5 -- Cryptanalysis of Tweaked Versions of SMASH and Reparation…”
Full Text via HEAL-Link
Electronic eBook -
9Published 2005Table of Contents: “… Attacks on the Nonlinear Filters -- Non-randomness of the Full 4 and 5-Pass HAVAL -- Email Security…”
Full Text via HEAL-Link
Electronic eBook -
10Published 2003Table of Contents: “… Extenders for UOWHF -- Cryptanalysis of 3-Pass HAVAL -- Group Signatures -- Efficient Group Signatures…”
Full Text via HEAL-Link
Electronic eBook -
11Published 2009Table of Contents: “… on the HMAC/NMAC Based on 3 and 4-Pass HAVAL -- Cryptanalysis -- Memoryless Related-Key Boomerang Attack…”
Full Text via HEAL-Link
Electronic eBook -
12Published 2007Table of Contents: “… Privacy for Mobile Communications -- How to Find Many Collisions of 3-Pass HAVAL -- A Secure Threshold…”
Full Text via HEAL-Link
Electronic eBook -
13Published 2008Table of Contents: “… and Range Proofs -- Cryptographic Hash Functions II -- Preimage Attacks on 3, 4, and 5-Pass HAVAL -- How…”
Full Text via HEAL-Link
Electronic eBook -
14Published 2009Table of Contents: “… Using Output Truncation in 3-Pass HAVAL -- On Free-Start Collisions and Collisions for TIB3 -- Database…”
Full Text via HEAL-Link
Electronic eBook -
15Published 2002Table of Contents: “… Oblivious Transfer -- Cryptanalysis II -- On the Security of Reduced Versions of 3-Pass HAVAL…”
Full Text via HEAL-Link
Electronic eBook -
16Published 2005Table of Contents: “… of MD4, MD5 and HAVAL -- Cryptanalysis of PASS II and MiniPass -- Simple Power Analysis on Fast Modular…”
Full Text via HEAL-Link
Electronic eBook