메뉴 건너뛰기




Volumn 4047 LNCS, Issue , 2006, Pages 278-292

The impact of carries on the complexity of collision attacks on SHA-1

Author keywords

[No Author keywords available]

Indexed keywords

COLLISION AVOIDANCE; COMPUTATIONAL COMPLEXITY; COMPUTER AIDED ANALYSIS; COMPUTER SOFTWARE; CRYPTOGRAPHY; PROBABILITY;

EID: 33746768161     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11799313_18     Document Type: Conference Paper
Times cited : (17)

References (21)
  • 1
    • 35048892549 scopus 로고    scopus 로고
    • Near-collisions of SHA-0
    • Matthew K. Franklin, editor, CRYPTO 2004, Santa Barbara, California, USA, August 15-19, 2004, Proceedings. Springer
    • Eli Biham and Rafi Chen. Near-Collisions of SHA-0. In Matthew K. Franklin, editor, CRYPTO 2004, Santa Barbara, California, USA, August 15-19, 2004, Proceedings, volume 3152 of LNCS, pages 290-305. Springer, 2004.
    • (2004) LNCS , vol.3152 , pp. 290-305
    • Biham, E.1    Chen, R.2
  • 2
    • 24944584156 scopus 로고    scopus 로고
    • Collisions of SHA-0 and reduced SHA-1
    • Ronald Cramer, editor, EUROCRYPT 2005, Aarhus, Denmark, May 22-26, 2005. Proceedings. Springer
    • Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, and William Jalby. Collisions of SHA-0 and Reduced SHA-1. In Ronald Cramer, editor, EUROCRYPT 2005, Aarhus, Denmark, May 22-26, 2005. Proceedings, volume 3494 of LNCS, pages 36-57. Springer, 2005.
    • (2005) LNCS , vol.3494 , pp. 36-57
    • Biham, E.1    Chen, R.2    Joux, A.3    Carribault, P.4    Lemuet, C.5    Jalby, W.6
  • 4
    • 26444487299 scopus 로고    scopus 로고
    • PhD thesis, Ruhr Universität Bochum
    • Magnus Daum. Cryptanalysis of Hash Functions of the MD4-Family. PhD thesis, Ruhr Universität Bochum, 2005. Available at http://http://www.cits.rub.de/imperia/md/content/magnus/dissmd4.pdf.
    • (2005) Cryptanalysis of Hash Functions of the MD4-family
    • Daum, M.1
  • 5
    • 84958953847 scopus 로고    scopus 로고
    • Cryptanalysis of MD4
    • Bart Preneel, editor, Fast Software Encryption, Cambridge, UK, February 21-23, 1996, Proceedings. Springer
    • Hans Dobbertin. Cryptanalysis of MD4. In Bart Preneel, editor, Fast Software Encryption, Cambridge, UK, February 21-23, 1996, Proceedings, volume 1039 of LNCS, pages 53-69. Springer, 1996.
    • (1996) LNCS , vol.1039 , pp. 53-69
    • Dobbertin, H.1
  • 6
    • 0005268716 scopus 로고    scopus 로고
    • Cryptanalysis of MD4
    • Hans Dobbertin. Cryptanalysis Of MD4. Journal of Cryptology, 11(4):253-271, 1998.
    • (1998) Journal of Cryptology , vol.11 , Issue.4 , pp. 253-271
    • Dobbertin, H.1
  • 7
    • 33746693506 scopus 로고    scopus 로고
    • A matching lower bound on the minimum weight of SHA-1 expansion code
    • Report 2005/266
    • Charanjit S. Jutla and Anindya C. Patthak. A Matching Lower Bound on the Minimum Weight of SHA-1 Expansion Code. Cryptology ePrint Archive, Report 2005/266, 2005. http://eprint.iacr.org/.
    • (2005) Cryptology ePrint Archive
    • Jutla, C.S.1    Patthak, A.C.2
  • 8
    • 33746710153 scopus 로고    scopus 로고
    • A simple and provably good code for SHA message expansion
    • Report 2005/247
    • Charanjit S. Jutla and Anindya C. Patthak. A Simple and Provably Good Code for SHA Message Expansion. Cryptology ePrint Archive, Report 2005/247, 2005. http://eprint.iacr.org/.
    • (2005) Cryptology ePrint Archive
    • Jutla, C.S.1    Patthak, A.C.2
  • 11
    • 33745126502 scopus 로고    scopus 로고
    • Finding good differential patterns for attacks on SHA-1
    • Report 2004/364
    • Krystian Matusiewicz and Josef Pieprzyk. Finding good differential patterns for attacks on SHA-1. Cryptology ePrint Archive, Report 2004/364, 2004. http://eprint.iacr.org/.
    • (2004) Cryptology ePrint Archive
    • Matusiewicz, K.1    Pieprzyk, J.2
  • 12
    • 4043135942 scopus 로고    scopus 로고
    • August
    • National Institute of Standards and Technology (NIST). FIPS-180-2: Secure Hash Standard, August 2002. Available online at http://www.itl.nist.gov/fipspubs/.
    • (2002) FIPS-180-2: Secure Hash Standard
  • 13
    • 33646824396 scopus 로고    scopus 로고
    • Exploiting coding theory for collision attacks on SHA-1
    • Nigel P. Smart, editor, Cryptography and Coding, Cirencester, UK, December 19-81, 8005, Proceedings. Springer
    • Norbert Pramstaller, Christian Rechberger, and Vincent Rijmen. Exploiting Coding Theory for Collision Attacks on SHA-1. In Nigel P. Smart, editor, Cryptography and Coding, Cirencester, UK, December 19-81, 8005, Proceedings, volume 3796 of LNCS, pages 78-95. Springer, 2005.
    • (2005) LNCS , vol.3796 , pp. 78-95
    • Pramstaller, N.1    Rechberger, C.2    Rijmen, V.3
  • 15
    • 24144478826 scopus 로고    scopus 로고
    • Update on SHA-1
    • Alfred Menezes, editor, CT-RSA 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings. Springer
    • Vincent Rijmen and Elisabeth Oswald. Update on SHA-1. In Alfred Menezes, editor, CT-RSA 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, volume 3376 of LNCS, pages 58-71. Springer, 2005.
    • (2005) LNCS , vol.3376 , pp. 58-71
    • Rijmen, V.1    Oswald, E.2
  • 17
    • 24944575304 scopus 로고    scopus 로고
    • Cryptanalysis of the hash functions MD4 and RIPEMD
    • Ronald Cramer, editor, EUROCRYPT 8005, Aarhus, Denmark, May 22-26, 2005. Proceedings. Springer
    • Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, and Xiuyuan Yu. Cryptanalysis of the Hash Functions MD4 and RIPEMD. In Ronald Cramer, editor, EUROCRYPT 8005, Aarhus, Denmark, May 22-26, 2005. Proceedings, volume 3494 of LNCS, pages 1-18. Springer, 2005.
    • (2005) LNCS , vol.3494 , pp. 1-18
    • Wang, X.1    Lai, X.2    Feng, D.3    Chen, H.4    Yu, X.5
  • 19
    • 33745171465 scopus 로고    scopus 로고
    • Finding collisions in the full SHA-1
    • Victor Shoup, editor, CRYPTO 2005, Santa Barbara, California, USA, August 14-18, 2005, Proceedings. Springer
    • Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu. Finding Collisions in the Full SHA-1. In Victor Shoup, editor, CRYPTO 2005, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, volume 3621 of LNCS, pages 17-36. Springer, 2005.
    • (2005) LNCS , vol.3621 , pp. 17-36
    • Wang, X.1    Yin, Y.L.2    Yu, H.3
  • 20
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • Ronald Cramer, editor, EUROCRYPT 2005, Aarhus, Denmark, May 22-26, 2005. Proceedings. Springer
    • Xiaoyun Wang and Hongbo Yu. How to Break MD5 and Other Hash Functions. In Ronald Cramer, editor, EUROCRYPT 2005, Aarhus, Denmark, May 22-26, 2005. Proceedings, volume 3494 of LNCS, pages 19-35. Springer, 2005.
    • (2005) LNCS , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2
  • 21
    • 33745122987 scopus 로고    scopus 로고
    • Efficient collision search attacks on SHA-0
    • Victor Shoup, editor, CRYPTO 2005, Santa Barbara, California, USA, August 14-18, 2005, Proceedings. Springer
    • Xiaoyun Wang, Hongbo Yu, and Yiqun Lisa Yin. Efficient Collision Search Attacks on SHA-0. In Victor Shoup, editor, CRYPTO 2005, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, volume 3621 of LNCS, pages 1-16. Springer, 2005.
    • (2005) LNCS , vol.3621 , pp. 1-16
    • Wang, X.1    Yu, H.2    Yin, Y.L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.