HAVAL is a cryptographic hash function. Unlike MD5, but like most modern cryptographic hash functions, HAVAL can produce hashes of different lengths. HAVAL can produce hashes in lengths of 128 bits, 160 bits, 192 bits, 224 bits, and 256 bits. HAVAL also allows users to specify the number of rounds (3, 4, or 5) to be used to generate the hash.

References in zbMATH (referenced in 41 articles , 1 standard article )

Showing results 1 to 20 of 41.
Sorted by year (citations)

1 2 3 next

  1. Andreeva, Elena; Mennink, Bart; Preneel, Bart: Open problems in hash function security (2015)
  2. Guo, Jian; Su, Chunhua; Yap, Wun-She: An improved preimage attack against HAVAL-3 (2015)
  3. Yen, Sung-Ming; Lin, Hsi-Chung; Chen, Yen-Chang; Hung, Jia-Jun; Wu, Jui-Ming: PayStar: a denomination flexible micropayment scheme (2014)
  4. Wang, Gao-Li: Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD (2013)
  5. Sasaki, Yu: Boomerang distinguishers on MD4-family: first practical results on full 5-pass HAVAL (2012)
  6. Zhang, Wenying; Li, Yanyan; Wu, Lei: A new one-bit difference collision attack on HAVAL-128 (2012)
  7. Aoki, Kazumaro; Sasaki, Yu: Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1 (2009)
  8. Aumasson, Jean-Philippe; Meier, Willi; Mendel, Florian: Preimage attacks on 3-pass HAVAL and step-reduced MD5 (2009)
  9. Wang, Gaoli; Wang, Shaohui: Second preimage attack on 5-pass HAVAL and partial key-recovery attack on HMAC/NMAC-5-pass HAVAL (2009)
  10. Lee, Eunjin; Chang, Donghoon; Kim, Jongsung; Sung, Jaechul; Hong, Seokhie: Second preimage attack on 3-pass HAVAL and partial key-recovery attacks on HMAC/NMAC-3-pass HAVAL (2008)
  11. Sasaki, Yu; Aoki, Kazumaro: Preimage attacks on 3, 4, and 5-pass HAVAL (2008)
  12. Chang, Donghoon; Gupta, Kishan Chand; Nandi, Mridul: RC4-Hash: A new hash function based on RC4. (Extended abstract) (2006)
  13. Hong, Deukjo; Chang, Donghoon; Sung, Jaechul; Lee, Sangjin; Hong, Seokhie; Lee, Jaesang; Moon, Dukjae; Chee, Sungtaek: A new dedicated 256-bit hash function: FORK-256 (2006)
  14. Kim, Jongsung; Biryukov, Alex; Preneel, Bart; Hong, Seokhie: On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1. (Extended abstract) (2006)
  15. Matusiewicz, Krystian; Pieprzyk, Josef: Finding good differential patterns for attacks on SHA-1 (2006)
  16. Yu, Hongbo; Wang, Xiaoyun; Yun, Aaram; Park, Sangwoo: Cryptanalysis of the full HAVAL with 4 and 5 passes (2006)
  17. Daum, Magnus: Cryptanalysis of hash functions on the MD4-family. (2005)
  18. Kim, Jongsung; Biryukov, Alex; Preneel, Bart; Lee, Sangjin: On the security of encryption modes of MD4, MD5 and HAVAL (2005)
  19. Wang, Xiaoyun; Lai, Xuejia; Feng, Dengguo; Chen, Hui; Yu, Xiuyuan: Cryptanalysis of the hash functions MD4 and RIPEMD (2005)
  20. Wang, Xiaoyun; Yu, Hongbo: How to break MD5 and other hash functions (2005)

1 2 3 next