-
1
-
-
35048892549
-
Near-collisions of SHA-0
-
Proceedings of CRYPTO 2004. Springer
-
Eli Biham and Rafi Chen. Near-Collisions of SHA-0. In Proceedings of CRYPTO 2004, volume 3152 of LNCS, pages 290-305. Springer, 2004.
-
(2004)
LNCS
, vol.3152
, pp. 290-305
-
-
Biham, E.1
Chen, R.2
-
2
-
-
24944584156
-
Collisions of SHA-0 and reduced SHA-1
-
Proceedings of EUROCRYPT 2005. Springer
-
Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, and William Jalby. Collisions of SHA-0 and Reduced SHA-1. In Proceedings of EUROCRYPT 2005, volume 3494 of LNCS, pages 36-57. Springer, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 36-57
-
-
Biham, E.1
Chen, R.2
Joux, A.3
Carribault, P.4
Lemuet, C.5
Jalby, W.6
-
3
-
-
0031675932
-
A new algorithm for-finding minimum-weight words in a linear code: Application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511
-
Anne Canteaut and Florent Chabaud. A New Algorithm for-Finding Minimum-Weight Words in a Linear Code: Application to McEliece's Cryptosystem and to Narrow-Sense BCH Codes of Length 511. IEEE Transactions on Information Theory, 44(1): 367-378, 1998.
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.1
, pp. 367-378
-
-
Canteaut, A.1
Chabaud, F.2
-
4
-
-
84948963042
-
On the security of some cryptosystems based on error-correcting codes
-
Proceedings of EUROCRYPT '94. Springer
-
Florent Chabaud. On the Security of Some Cryptosystems Based on Error-correcting Codes. In Proceedings of EUROCRYPT '94, volume 950 of LNCS, pages 131-139. Springer, 1995.
-
(1995)
LNCS
, vol.950
, pp. 131-139
-
-
Chabaud, F.1
-
5
-
-
84957643546
-
Differential collisions in SHA-0
-
Proceedings of CRYPTO '98. Springer
-
Florent Chabaud and Antoine Joux. Differential Collisions in SHA-0. In Proceedings of CRYPTO '98, volume 1462 of LNCS, pages 56-71. Springer, 1998.
-
(1998)
LNCS
, vol.1462
, pp. 56-71
-
-
Chabaud, F.1
Joux, A.2
-
6
-
-
84958953847
-
Cryptanalysis of MD4
-
Proceedings of Fast Software Encryption. Springer
-
Hans Dobbertin. Cryptanalysis of MD4. In Proceedings of Fast Software Encryption, volume 1039 of LNCS, pages 53-69. Springer, 1996.
-
(1996)
LNCS
, vol.1039
, pp. 53-69
-
-
Dobbertin, H.1
-
9
-
-
0024078914
-
A probabilistic algorithm for computing minimum weights of large error-correcting codes
-
Jeffrey S. Leon. A probabilistic algorithm for computing minimum weights of large error-correcting codes. IEEE Transactions on Information Theory, 34(5):1354-1359, 1988.
-
(1988)
IEEE Transactions on Information Theory
, vol.34
, Issue.5
, pp. 1354-1359
-
-
Leon, J.S.1
-
10
-
-
33646841956
-
Finding good differential patterns for attacks on SHA-1
-
Krystian Matusiewicz and Josef Pieprzyk. Finding good differential patterns for attacks on SHA-1. In Proceedings of WCC 2005. Available online at http://www.ics.mq.edu.au/-kmatus/FindingGD.pdf.
-
Proceedings of WCC 2005
-
-
Matusiewicz, K.1
Pieprzyk, J.2
-
11
-
-
4043135942
-
-
August
-
National Institute of Standards and Technology (NIST). FIPS-180-2: Secure Hash Standard, August 2002. Available online at http://www.itl.nist.gov/ fipspubs/.
-
(2002)
FIPS-180-2: Secure Hash Standard
-
-
-
12
-
-
24144478826
-
Update on SHA-1
-
Proceedings of CTRSA 2005. Springer
-
Vincent Rijmen and Elisabeth Oswald. Update on SHA-1. In Proceedings of CTRSA 2005, volume 3376 of LNCS, pages 58-71. Springer, 2005.
-
(2005)
LNCS
, vol.3376
, pp. 58-71
-
-
Rijmen, V.1
Oswald, E.2
-
13
-
-
84964937021
-
A method for finding codewords of small weight
-
Proceedings of Coding Theory and Applications 1988. Springer
-
Jacques Stern. A method for finding codewords of small weight. In Proceedings of Coding Theory and Applications 1988, volume 388 of LNCS, pages 106-113. Springer, 1989.
-
(1989)
LNCS
, vol.388
, pp. 106-113
-
-
Stern, J.1
-
14
-
-
19944425657
-
Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD
-
August Preprint
-
Xiaoyun Wang, Dengguo Feng, Xuejia Lai, and Xiuyuan Yu. Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD, August 2004. Preprint, available at http://eprint.iacr.org/2004/199, presented at the Crypto 2004 rump session.
-
(2004)
Crypto 2004 Rump Session
-
-
Wang, X.1
Feng, D.2
Lai, X.3
Xiuyuan, Yu.4
-
15
-
-
24944575304
-
Crypt-analysis for hash functions MD4 and RIPEMD
-
Proceedings of EUROCRYPT 2005. Springer
-
Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, and Xiuyuan Yu. Crypt-analysis for Hash Functions MD4 and RIPEMD. In Proceedings of EUROCRYPT 2005, volume 3494 of LNCS, pages 1-18. Springer, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 1-18
-
-
Wang, X.1
Lai, X.2
Feng, D.3
Chen, H.4
Xiuyuan, Yu.5
-
16
-
-
33745171465
-
Finding collisions in the full SHA-1
-
Proceedings of CRYPTO 2005. Springer
-
Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu. Finding Collisions in the Full SHA-1. In Proceedings of CRYPTO 2005, volume 3621 of LNCS, pages 17-36. Springer,2005.
-
(2005)
LNCS
, vol.3621
, pp. 17-36
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
17
-
-
24944591357
-
How to break MD5 and other hash functions
-
Proceedings of EUROCRYPT 2005. Springer
-
Xiaoyun Wang and Hongbo Yu. How to Break MD5 and Other Hash Functions. In Proceedings of EUROCRYPT 2005, volume 3494 of LNCS, pages 19-35. Springer, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Hongbo, Yu.2
|