HAVAL is a cryptographic hash function. Unlike MD5, but like most modern cryptographic hash functions, HAVAL can produce hashes of different lengths. HAVAL can produce hashes in lengths of 128 bits, 160 bits, 192 bits, 224 bits, and 256 bits. HAVAL also allows users to specify the number of rounds (3, 4, or 5) to be used to generate the hash.

References in zbMATH (referenced in 45 articles , 1 standard article )

Showing results 1 to 20 of 45.
Sorted by year (citations)

1 2 3 next

  1. Mesnager, Sihem; Mandal, Bimal; Tang, Chunming: New characterizations and construction methods of bent and hyper-bent Boolean functions (2020)
  2. Yang, Yu-Guang; Bi, Jing-Lin; Li, Dan; Zhou, Yi-Hua; Shi, Wei-Min: Hash function based on quantum walks (2019)
  3. Yang, Yu-Guang; Bi, Jing-Lin; Chen, Xiu-Bo; Yuan, Zheng; Zhou, Yi-Hua; Shi, Wei-Min: Simple hash function using discrete-time quantum walks (2018)
  4. Andreeva, Elena; Mennink, Bart; Preneel, Bart: Open problems in hash function security (2015)
  5. Guo, Jian; Su, Chunhua; Yap, Wun-She: An improved preimage attack against \textttHAVAL-3 (2015)
  6. Yen, Sung-Ming; Lin, Hsi-Chung; Chen, Yen-Chang; Hung, Jia-Jun; Wu, Jui-Ming: PayStar: a denomination flexible micropayment scheme (2014) ioport
  7. Wang, Gao-Li: Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD (2013)
  8. Sasaki, Yu: Boomerang distinguishers on MD4-family: first practical results on full 5-pass HAVAL (2012)
  9. Zhang, Wenying; Li, Yanyan; Wu, Lei: A new one-bit difference collision attack on HAVAL-128 (2012)
  10. Aoki, Kazumaro; Sasaki, Yu: Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1 (2009)
  11. Aumasson, Jean-Philippe; Meier, Willi; Mendel, Florian: Preimage attacks on 3-pass HAVAL and step-reduced MD5 (2009)
  12. Sasaki, Yu: Meet-in-the-middle attacks using output truncation in 3-pass HAVAL (2009)
  13. Wang, Gaoli; Wang, Shaohui: Second preimage attack on 5-pass HAVAL and partial key-recovery attack on HMAC/NMAC-5-pass HAVAL (2009)
  14. Lee, Eunjin; Chang, Donghoon; Kim, Jongsung; Sung, Jaechul; Hong, Seokhie: Second preimage attack on 3-pass HAVAL and partial key-recovery attacks on HMAC/NMAC-3-pass HAVAL (2008)
  15. Sasaki, Yu; Aoki, Kazumaro: Preimage attacks on 3, 4, and 5-pass HAVAL (2008)
  16. Chang, Donghoon; Gupta, Kishan Chand; Nandi, Mridul: RC4-Hash: A new hash function based on RC4. (Extended abstract) (2006)
  17. Hong, Deukjo; Chang, Donghoon; Sung, Jaechul; Lee, Sangjin; Hong, Seokhie; Lee, Jaesang; Moon, Dukjae; Chee, Sungtaek: A new dedicated 256-bit hash function: FORK-256 (2006)
  18. Kim, Jongsung; Biryukov, Alex; Preneel, Bart; Hong, Seokhie: On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1. (Extended abstract) (2006)
  19. Matusiewicz, Krystian; Pieprzyk, Josef: Finding good differential patterns for attacks on SHA-1 (2006)
  20. Yu, Hongbo; Wang, Xiaoyun; Yun, Aaram; Park, Sangwoo: Cryptanalysis of the full HAVAL with 4 and 5 passes (2006)

1 2 3 next