2019
DOI: 10.1007/978-3-030-26951-7_5
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Collision Attack Frameworks for RIPEMD-160

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 29 publications
0
1
0
Order By: Relevance
“…Internet of Things (IoT) applications make use of a cryptographic hash function called RIPEMD-160, which has a bit length of 160. The RIPEMD-160 algorithm produces a oneof-a-kind, unforgeable hash for each input, which can be used to check the validity of the information [197]. It is immune to collision attacks, and RIPEMD-160 is regarded more secure than its predecessor, RIPEMD-128.…”
Section: Ripemd-160mentioning
confidence: 99%
“…Internet of Things (IoT) applications make use of a cryptographic hash function called RIPEMD-160, which has a bit length of 160. The RIPEMD-160 algorithm produces a oneof-a-kind, unforgeable hash for each input, which can be used to check the validity of the information [197]. It is immune to collision attacks, and RIPEMD-160 is regarded more secure than its predecessor, RIPEMD-128.…”
Section: Ripemd-160mentioning
confidence: 99%