메뉴 건너뛰기




Volumn 4817 LNCS, Issue , 2007, Pages 193-205

New local collisions for the SHA-2 hash family

Author keywords

[No Author keywords available]

Indexed keywords

APPROXIMATION ALGORITHMS; BOOLEAN FUNCTIONS; COLLISION AVOIDANCE; COMPUTATIONAL METHODS; LINEARIZATION; PROBABILITY;

EID: 38149131741     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-76788-6_16     Document Type: Conference Paper
Times cited : (11)

References (15)
  • 2
    • 84957643546 scopus 로고    scopus 로고
    • Differential collisions in SHA-0
    • Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
    • Chabaud, F., Joux, A.: Differential collisions in SHA-0. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 56-71. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 56-71
    • Chabaud, F.1    Joux, A.2
  • 3
    • 38049111724 scopus 로고    scopus 로고
    • EUROCRYPT 2005
    • Cramer, R.J.F, ed, Springer, Heidelberg
    • Cramer, R.J.F. (ed.): EUROCRYPT 2005. LNCS, vol. 3494, pp. 22-26. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 22-26
  • 4
    • 35048844179 scopus 로고    scopus 로고
    • Gilbert, H., Handschuh, H.: Security analysis of SHA-256 and sisters. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, 3006, pp. 175-193. Springer, Heidelberg (2004)
    • Gilbert, H., Handschuh, H.: Security analysis of SHA-256 and sisters. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 175-193. Springer, Heidelberg (2004)
  • 5
    • 38149128345 scopus 로고    scopus 로고
    • On corrective patterns for the SHA-2 family. Cryptology ePrint Archive
    • Report 2004/207 August
    • Hawkes, P., Paddon, M., Rose, G.G.: On corrective patterns for the SHA-2 family. Cryptology ePrint Archive, Report 2004/207 (August 2004), http://eprint.iacr.org/2004/207
    • (2004)
    • Hawkes, P.1    Paddon, M.2    Rose, G.G.3
  • 6
    • 84896851939 scopus 로고    scopus 로고
    • Matusiewicz, K., Pieprzyk, J., Pramstaller, N., Rechberger, C., Rijmen, V.: Analysis of simplified variants of SHA-256. In: Wolf, C., Lucks, S., Yau, P.-W. (eds.) WEWoRC, GI. LNI, 74, pp. 123-134 (2005)
    • Matusiewicz, K., Pieprzyk, J., Pramstaller, N., Rechberger, C., Rijmen, V.: Analysis of simplified variants of SHA-256. In: Wolf, C., Lucks, S., Yau, P.-W. (eds.) WEWoRC, GI. LNI, vol. 74, pp. 123-134 (2005)
  • 7
    • 33746664225 scopus 로고    scopus 로고
    • Mendel, F., Pramstaller, N., Rechberger, C., Rijmen, V.: Analysis of step-reduced SHA-256. In: Robshaw, M. (ed.) FSE 2006. LNCS, 4047, pp. 126-143. Springer, Heidelberg (2006)
    • Mendel, F., Pramstaller, N., Rechberger, C., Rijmen, V.: Analysis of step-reduced SHA-256. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, pp. 126-143. Springer, Heidelberg (2006)
  • 8
    • 24144478826 scopus 로고    scopus 로고
    • Rijmen, V., Oswald, E.: Update on SHA-1. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, 3376, pp. 58-71. Springer, Heidelberg (2005)
    • Rijmen, V., Oswald, E.: Update on SHA-1. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 58-71. Springer, Heidelberg (2005)
  • 9
    • 38149086988 scopus 로고    scopus 로고
    • New local collisions for the SHA-2 hash family. Cryptology ePrint Archive
    • Report 2007/352 September
    • Sanadhya, S.K., Sarkar, P.: New local collisions for the SHA-2 hash family. Cryptology ePrint Archive, Report 2007/352 (September 2007), http://eprint.iacr.org/2007/352
    • (2007)
    • Sanadhya, S.K.1    Sarkar, P.2
  • 10
  • 12
    • 33745171465 scopus 로고    scopus 로고
    • Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, 3621, pp. 17-36. Springer, Heidelberg (2005)
    • Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17-36. Springer, Heidelberg (2005)
  • 14
    • 0004149831 scopus 로고    scopus 로고
    • Wolfram Media, 5th edn
    • Wolfram, S.: The Mathematica Book. Wolfram Media, 5th edn. (2003), http://www.wolfram.com
    • (2003) The Mathematica Book
    • Wolfram, S.1
  • 15
    • 33745589233 scopus 로고    scopus 로고
    • Yoshida, H., Biryukov, A.: Analysis of a SHA-256 variant. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, 3897, pp. 245-260. Springer, Heidelberg (2006)
    • Yoshida, H., Biryukov, A.: Analysis of a SHA-256 variant. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 245-260. Springer, Heidelberg (2006)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.