메뉴 건너뛰기




Volumn 3621 LNCS, Issue , 2006, Pages 1-16

Efficient collision search attacks on SHA-0

Author keywords

Collision search attacks; Hash functions; SHA 0; SHA 1

Indexed keywords

CRYPTOGRAPHY; FUNCTION EVALUATION; INFORMATION TECHNOLOGY; LARGE SCALE SYSTEMS; ONLINE SEARCHING; SEARCH ENGINES; TECHNOLOGY;

EID: 33745122987     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (153)

References (16)
  • 1
    • 35048892549 scopus 로고    scopus 로고
    • Near collisions of SHA-0
    • Springer-Verlag, August
    • E. Biham and R. Chen. Near Collisions of SHA-0. Advances in Cryptology - Crypto'04, pp.290-305, Springer-Verlag, August 2004.
    • (2004) Advances in Cryptology - Crypto'04 , pp. 290-305
    • Biham, E.1    Chen, R.2
  • 6
    • 84957643546 scopus 로고    scopus 로고
    • Differential collisions in SHA-0
    • Springer-Verlag, August
    • F. Chabaud and A. Joux. Differential Collisions in SHA-0. Advances in Cryptology - Crypto'98, pp.56-71, Springer-Verlag, August 1998.
    • (1998) Advances in Cryptology - Crypto'98 , pp. 56-71
    • Chabaud, F.1    Joux, A.2
  • 8
    • 33745126502 scopus 로고    scopus 로고
    • Finding good differential patterns for attacks on SHA-1
    • December
    • K. Matusiewicz and J. Pieprzyk. Finding Good Differential Patterns for Attacks on SHA-1. IACR Eprint archive, December 2004.
    • (2004) IACR Eprint Archive
    • Matusiewicz, K.1    Pieprzyk, J.2
  • 11
    • 26444573353 scopus 로고    scopus 로고
    • The collision attack on hash function HAVAL-128
    • April
    • X. Y. Wang, D. G. Feng, X. Y. Yu. The Collision Attack on Hash Function HAVAL-128. In Chinese, Science in China, Series E, Vol. 35(4), pp.405-416, April, 2005.
    • (2005) Science in China, Series E , vol.35 , Issue.4 , pp. 405-416
    • Wang, X.Y.1    Feng, D.G.2    Yu, X.Y.3
  • 12
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • Springer-Verlag, May
    • X. Y. Wang and H. B. Yu. How to Break MD5 and Other Hash Functions. Advances in Cryptology-Eurocrypt'05, pp.19-35, Springer-Verlag, May 2005.
    • (2005) Advances in Cryptology-eurocrypt'05 , pp. 19-35
    • Wang, X.Y.1    Yu, H.B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.