@inproceedings{52d0187a39e14ead9e496b517a34aec3,
title = "Preimage attacks on reduced steps of ARIRANG and PKC98-hash",
abstract = "In this paper, we present the preimage attacks on step-reduced ARIRANG and PKC98-Hash. Our attacks find the preimages of 35 steps out of 40 steps of ARIRANG and 80 steps out of 96 steps of PKC98-Hash, faster than the brute force attack. We applied recently developed techniques of preimage attack. Our attack for ARIRANG is the improvement of the previous attack, and our attack for PKC98-hash is the first analysis result of its preimage resistance.",
keywords = "ARIRANG, Hash Function, Meet-in-the-middle, PKC98-hash, Preimage Attack, SHA-3 candidate",
author = "Deukjo Hong and Bonwook Koo and Kim, {Woo Hwan} and Daesung Kwon",
year = "2010",
doi = "10.1007/978-3-642-14423-3_21",
language = "English",
isbn = "3642144225",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "315--331",
booktitle = "Information Security and Cryptology - ICISC 2009 - 12th International Conference, Revised Selected Papers",
note = "12th International Conference on Information Security and Cryptology, ICISC 2009 ; Conference date: 02-12-2009 Through 04-12-2009",
}