-
1
-
-
35048892549
-
-
E. Biham and R. Chen. Near-Collisions of SHA-0. In M. K. Franklin, editor, Advances in Cryptology - CRYPTO 2004, 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings, 3152 of LNCS, pages 290-305. Springer, 2004.
-
E. Biham and R. Chen. Near-Collisions of SHA-0. In M. K. Franklin, editor, Advances in Cryptology - CRYPTO 2004, 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings, volume 3152 of LNCS, pages 290-305. Springer, 2004.
-
-
-
-
2
-
-
24944584156
-
-
E. Biham, R. Chen, A. Joux, P. Carribault, C. Lemuet, and W. Jalby. Collisions of SHA-0 and Reduced SHA-1. In R. Cramer, editor, Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings, 3494 of LNCS, pages 36-57. Springer, 2005.
-
E. Biham, R. Chen, A. Joux, P. Carribault, C. Lemuet, and W. Jalby. Collisions of SHA-0 and Reduced SHA-1. In R. Cramer, editor, Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings, volume 3494 of LNCS, pages 36-57. Springer, 2005.
-
-
-
-
3
-
-
33746706791
-
A Study of the MD5 Attacks: Insights and Improvements
-
M. Robshaw, editor, Proceedings of Fast Software Encryption, FSE, Graz, Austria, March 15-17, of, To appear. 2006
-
J. Black, M. Cochran, and T. Highland. A Study of the MD5 Attacks: Insights and Improvements. In M. Robshaw, editor, Proceedings of Fast Software Encryption - FSE 2006, Graz, Austria, March 15-17, 2006, volume 4047 of LNCS, 2006. To appear.
-
(2006)
LNCS
, vol.4047
-
-
Black, J.1
Cochran, M.2
Highland, T.3
-
4
-
-
84957643546
-
-
F. Chabaud and A. Joux. Differential Collisions in SHA-0. In H. Krawczyk, editor, Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, 1462 of LNCS, pages 56-71. Springer, 1998.
-
F. Chabaud and A. Joux. Differential Collisions in SHA-0. In H. Krawczyk, editor, Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, volume 1462 of LNCS, pages 56-71. Springer, 1998.
-
-
-
-
5
-
-
77649241429
-
Provably Good Codes for Hash Function Design
-
R. Cramer, editor, Proceedings of SAC 2006, Springer, to appear
-
C. S. Jutla and A. C. Patthak. Provably Good Codes for Hash Function Design. In R. Cramer, editor, Proceedings of SAC 2006, LNCS. Springer, 2006. to appear.
-
(2006)
LNCS
-
-
Jutla, C.S.1
Patthak, A.C.2
-
6
-
-
33746056045
-
-
J. Kelsey and T. Kohno. Herding Hash Functions and the Nostradamus Attack. In S. Vaudenay, editor, Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings, 4004 of LNCS, pages 183-200. Springer, 2005.
-
J. Kelsey and T. Kohno. Herding Hash Functions and the Nostradamus Attack. In S. Vaudenay, editor, Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings, volume 4004 of LNCS, pages 183-200. Springer, 2005.
-
-
-
-
7
-
-
34548114558
-
Tunnels in Hash Functions:MD5 Collisions Within a Minute. Cryptology ePrint Archive
-
Report 2006/105
-
V. Klima. Tunnels in Hash Functions:MD5 Collisions Within a Minute. Cryptology ePrint Archive, Report 2006/105, 2006. http://eprint.iacr.org/.
-
(2006)
-
-
Klima, V.1
-
8
-
-
33846418620
-
Improved Collision Attack on Hash Function MD5. Cryptology ePrint Archive
-
Report 2005/425
-
J. Liang and X. Lai. Improved Collision Attack on Hash Function MD5. Cryptology ePrint Archive, Report 2005/425, 2005. http://eprint.iacr.org/.
-
(2005)
-
-
Liang, J.1
Lai, X.2
-
9
-
-
79960038232
-
Improved Collision Attack on MD4. Cryptology ePrint Archive
-
Report 2005/151
-
Y. Naito, Y. Sasaki, N. Kunihiro, and K. Ohta. Improved Collision Attack on MD4. Cryptology ePrint Archive, Report 2005/151, 2005. http://eprint.iacr. org/.
-
(2005)
-
-
Naito, Y.1
Sasaki, Y.2
Kunihiro, N.3
Ohta, K.4
-
10
-
-
77649247915
-
Message Modification for Step 21-23 on SHA-0. Cryptology ePrint Archive
-
Report 2006/016
-
Y. Naito, Y. Sasaki, T. Shimoyama, J. Yajima, N. Kunihiro, and K. Ohta. Message Modification for Step 21-23 on SHA-0. Cryptology ePrint Archive, Report 2006/016, 2006. http://eprint.iacr.org/.
-
(2006)
-
-
Naito, Y.1
Sasaki, Y.2
Shimoyama, T.3
Yajima, J.4
Kunihiro, N.5
Ohta, K.6
-
11
-
-
4043135942
-
-
August, Available online at
-
National Institute of Standards and Technology (NIST). FIPS-180-2: Secure Hash Standard, August 2002. Available online at http://www.itl.nist.gov/ fipspubs/.
-
(2002)
FIPS-180-2: Secure Hash Standard
-
-
-
12
-
-
33646824396
-
-
N. Pramstaller, C. Rechberger, and V. Rijmen. Exploiting Coding Theory for Collision Attacks on SHA-1. In N. P. Smart, editor, Cryptography and Coding, 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings, 3796 of LNCS, pages 78-95. Springer, 2005.
-
N. Pramstaller, C. Rechberger, and V. Rijmen. Exploiting Coding Theory for Collision Attacks on SHA-1. In N. P. Smart, editor, Cryptography and Coding, 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings, volume 3796 of LNCS, pages 78-95. Springer, 2005.
-
-
-
-
13
-
-
24144478826
-
-
V. Rijmen and E. Oswald. Update on SHA-1. In A. Menezes, editor, Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, 3376 of LNCS, pages 58-71. Springer, 2005.
-
V. Rijmen and E. Oswald. Update on SHA-1. In A. Menezes, editor, Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, volume 3376 of LNCS, pages 58-71. Springer, 2005.
-
-
-
-
14
-
-
33746723520
-
Searching for Differential Paths in MD4
-
M. Robshaw, editor, Proceedings of Fast Software Encryption, FSE, Graz, Austria, March 15-17, of, To appear. 2006
-
M. Schläffer and E. Oswald. Searching for Differential Paths in MD4. In M. Robshaw, editor, Proceedings of Fast Software Encryption - FSE 2006, Graz, Austria, March 15-17, 2006, volume 4047 of LNCS, 2006. To appear.
-
(2006)
LNCS
, vol.4047
-
-
Schläffer, M.1
Oswald, E.2
-
15
-
-
38149060942
-
Fast Collision Attack on MD5. Cryptology ePrint Archive
-
Report 2006/104
-
M. Stevens. Fast Collision Attack on MD5. Cryptology ePrint Archive, Report 2006/104, 2006. http://eprint.iacr.org/.
-
(2006)
-
-
Stevens, M.1
-
16
-
-
54249084869
-
Gröbner Basis Based Cryptanalysis of SHA-1. Cryptology ePrint Archive
-
Report 2006/098
-
M. Sugita, M. Kawazoe, and H. Imai. Gröbner Basis Based Cryptanalysis of SHA-1. Cryptology ePrint Archive, Report 2006/098, 2006. http://eprint.iacr.org/.
-
(2006)
-
-
Sugita, M.1
Kawazoe, M.2
Imai, H.3
-
17
-
-
24944575304
-
-
X.Wang, X. Lai, D. Feng, H. Chen, and X. Yu. Cryptanalysis of the Hash Functions MD4 and RIPEMD. In R. Cramer, editor, Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings, 3494 of LNCS, pages 1-18. Springer, 2005.
-
X.Wang, X. Lai, D. Feng, H. Chen, and X. Yu. Cryptanalysis of the Hash Functions MD4 and RIPEMD. In R. Cramer, editor, Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings, volume 3494 of LNCS, pages 1-18. Springer, 2005.
-
-
-
-
19
-
-
77649258620
-
New Collision Search for SHA-1, August 2005. Presented at rump
-
session of CRYPTO
-
X. Wang, A. Yao, and F. Yao. New Collision Search for SHA-1, August 2005. Presented at rump session of CRYPTO 2005.
-
(2005)
-
-
Wang, X.1
Yao, A.2
Yao, F.3
-
20
-
-
33745171465
-
-
X. Wang, Y. L. Yin, and H. Yu. Finding Collisions in the Full SHA-1. In V. Shoup, editor, Advances in Cryptology - CRYPTO 2005, 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, 3621 of LNCS, pages 17-36. Springer, 2005.
-
X. Wang, Y. L. Yin, and H. Yu. Finding Collisions in the Full SHA-1. In V. Shoup, editor, Advances in Cryptology - CRYPTO 2005, 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, volume 3621 of LNCS, pages 17-36. Springer, 2005.
-
-
-
-
21
-
-
24944591357
-
-
X. Wang and H. Yu. How to Break MD5 and Other Hash Functions. In R. Cramer, editor, Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings, 3494 of LNCS, pages 19-35. Springer, 2005.
-
X. Wang and H. Yu. How to Break MD5 and Other Hash Functions. In R. Cramer, editor, Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings, volume 3494 of LNCS, pages 19-35. Springer, 2005.
-
-
-
-
22
-
-
33745122987
-
-
X. Wang, H. Yu, and Y. L. Yin. Efficient Collision Search Attacks on SHA-0. In V. Shoup, editor, Advances in Cryptology - CRYPTO 2005, 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, 3621 of LNCS, pages 1-16. Springer, 2005.
-
X. Wang, H. Yu, and Y. L. Yin. Efficient Collision Search Attacks on SHA-0. In V. Shoup, editor, Advances in Cryptology - CRYPTO 2005, 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, volume 3621 of LNCS, pages 1-16. Springer, 2005.
-
-
-
-
23
-
-
77649253191
-
-
Personal Communication, March
-
Y. L. Yin. Personal Communication, March 2006.
-
(2006)
-
-
Yin, Y.L.1
|