-
1
-
-
24944584156
-
-
Cramer [3, pp
-
Biham, E., Chen, R., Joux, A., Carribault, P., Lemuet, C., Jalby, W.: Collisions of SHA-0 and reduced SHA-I. In: Cramer [3], pp. 36-57
-
Collisions of SHA-0 and reduced SHA-I
, pp. 36-57
-
-
Biham, E.1
Chen, R.2
Joux, A.3
Carribault, P.4
Lemuet, C.5
Jalby, W.6
-
2
-
-
84957643546
-
Differential collisions in SHA-0
-
Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
-
Chabaud, F., Joux, A.: Differential collisions in SHA-0. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 56-71. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 56-71
-
-
Chabaud, F.1
Joux, A.2
-
3
-
-
38049111724
-
EUROCRYPT 2005
-
Cramer, R.J.F, ed, Springer, Heidelberg
-
Cramer, R.J.F. (ed.): EUROCRYPT 2005. LNCS, vol. 3494, pp. 22-26. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 22-26
-
-
-
4
-
-
35048844179
-
-
Gilbert, H., Handschuh, H.: Security analysis of SHA-256 and sisters. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, 3006, pp. 175-193. Springer, Heidelberg (2004)
-
Gilbert, H., Handschuh, H.: Security analysis of SHA-256 and sisters. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 175-193. Springer, Heidelberg (2004)
-
-
-
-
5
-
-
38149128345
-
On corrective patterns for the SHA-2 family. Cryptology ePrint Archive
-
Report 2004/207 August
-
Hawkes, P., Paddon, M., Rose, G.G.: On corrective patterns for the SHA-2 family. Cryptology ePrint Archive, Report 2004/207 (August 2004), http://eprint.iacr.org/2004/207
-
(2004)
-
-
Hawkes, P.1
Paddon, M.2
Rose, G.G.3
-
6
-
-
84896851939
-
-
Matusiewicz, K., Pieprzyk, J., Pramstaller, N., Rechberger, C., Rijmen, V.: Analysis of simplified variants of SHA-256. In: Wolf, C., Lucks, S., Yau, P.-W. (eds.) WEWoRC, GI. LNI, 74, pp. 123-134 (2005)
-
Matusiewicz, K., Pieprzyk, J., Pramstaller, N., Rechberger, C., Rijmen, V.: Analysis of simplified variants of SHA-256. In: Wolf, C., Lucks, S., Yau, P.-W. (eds.) WEWoRC, GI. LNI, vol. 74, pp. 123-134 (2005)
-
-
-
-
7
-
-
33746664225
-
-
Mendel, F., Pramstaller, N., Rechberger, C., Rijmen, V.: Analysis of step-reduced SHA-256. In: Robshaw, M. (ed.) FSE 2006. LNCS, 4047, pp. 126-143. Springer, Heidelberg (2006)
-
Mendel, F., Pramstaller, N., Rechberger, C., Rijmen, V.: Analysis of step-reduced SHA-256. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, pp. 126-143. Springer, Heidelberg (2006)
-
-
-
-
8
-
-
24144478826
-
-
Rijmen, V., Oswald, E.: Update on SHA-1. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, 3376, pp. 58-71. Springer, Heidelberg (2005)
-
Rijmen, V., Oswald, E.: Update on SHA-1. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 58-71. Springer, Heidelberg (2005)
-
-
-
-
9
-
-
38149086988
-
New local collisions for the SHA-2 hash family. Cryptology ePrint Archive
-
Report 2007/352 September
-
Sanadhya, S.K., Sarkar, P.: New local collisions for the SHA-2 hash family. Cryptology ePrint Archive, Report 2007/352 (September 2007), http://eprint.iacr.org/2007/352
-
(2007)
-
-
Sanadhya, S.K.1
Sarkar, P.2
-
10
-
-
0003629990
-
-
Department of Commerce, National Institute of Standards and TechnologyNIST, available at
-
Secure Hash Standard. Federad Information Processing Standard Publication 180-2. U.S. Department of Commerce, National Institute of Standards and Technology(NIST) (2002), available at: http://csrc.nist.gov/encryption/tkhash. html
-
(2002)
Secure Hash Standard. Federad Information Processing Standard Publication 180-2. U.S
-
-
-
11
-
-
24944575304
-
-
Cramer [3, pp
-
Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the hash functions MD4 and RIPEMD. In: Cramer [3], pp. 1-18
-
Cryptanalysis of the hash functions MD4 and RIPEMD
, pp. 1-18
-
-
Wang, X.1
Lai, X.2
Feng, D.3
Chen, H.4
Yu, X.5
-
12
-
-
33745171465
-
-
Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, 3621, pp. 17-36. Springer, Heidelberg (2005)
-
Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17-36. Springer, Heidelberg (2005)
-
-
-
-
14
-
-
0004149831
-
-
Wolfram Media, 5th edn
-
Wolfram, S.: The Mathematica Book. Wolfram Media, 5th edn. (2003), http://www.wolfram.com
-
(2003)
The Mathematica Book
-
-
Wolfram, S.1
-
15
-
-
33745589233
-
-
Yoshida, H., Biryukov, A.: Analysis of a SHA-256 variant. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, 3897, pp. 245-260. Springer, Heidelberg (2006)
-
Yoshida, H., Biryukov, A.: Analysis of a SHA-256 variant. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 245-260. Springer, Heidelberg (2006)
-
-
-
|