메뉴 건너뛰기




Volumn 4876 LNCS, Issue , 2007, Pages 56-73

Collisions for 70-step SHA-1: On the full cost of collision search

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL COMPLEXITY; PROBLEM SOLVING; STANDARDIZATION; UNCERTAINTY ANALYSIS;

EID: 38549144112     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-77360-3_4     Document Type: Conference Paper
Times cited : (45)

References (21)
  • 1
    • 35048892549 scopus 로고    scopus 로고
    • Near-Collisions of SHA-O
    • Franklin, M.K, ed, CRYPTO 2004, Springer, Heidelberg
    • Biham, E., Chen, R.: Near-Collisions of SHA-O. In: Franklin, M.K. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 290-305. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 290-305
    • Biham, E.1    Chen, R.2
  • 2
    • 24944584156 scopus 로고    scopus 로고
    • Biham, E., Chen, R., Joux, A., Carribault, P., Lemuet, C., Jalby, W.: Collisions of SHA-0 and Reduced SHA-1. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, 3494, pp. 36-57. Springer, Heidelberg (2005)
    • Biham, E., Chen, R., Joux, A., Carribault, P., Lemuet, C., Jalby, W.: Collisions of SHA-0 and Reduced SHA-1. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 36-57. Springer, Heidelberg (2005)
  • 3
    • 38049183978 scopus 로고    scopus 로고
    • Finding SHA-1 Characteristics: General Results and Applications
    • Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
    • De Cannière, C., Rechberger, C.: Finding SHA-1 Characteristics: General Results and Applications. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 1-20. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 1-20
    • De Cannière, C.1    Rechberger, C.2
  • 4
    • 84957643546 scopus 로고    scopus 로고
    • Differential Collisions in SHA-0
    • Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
    • Chabaud, F., Joux, A.: Differential Collisions in SHA-0. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 56-71. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 56-71
    • Chabaud, F.1    Joux, A.2
  • 6
    • 38049182746 scopus 로고    scopus 로고
    • Hash Functions and the (Amplified) Boomerang Attack
    • Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
    • Joux, A., Peyrin, T.: Hash Functions and the (Amplified) Boomerang Attack. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 244-263. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 244-263
    • Joux, A.1    Peyrin, T.2
  • 7
    • 38549171647 scopus 로고    scopus 로고
    • Jutla, CS., Patthak, A.C.: Provably Good Codes for Hash Function Design. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, 4356. Springer, Heidelberg (2006)
    • Jutla, CS., Patthak, A.C.: Provably Good Codes for Hash Function Design. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol. 4356. Springer, Heidelberg (2006)
  • 8
    • 34548114558 scopus 로고    scopus 로고
    • Tunnels in Hash Functions: MD5 Collisions Within a Minute. Cryptology ePrint Archive
    • Report 2006/105
    • Klima, V.: Tunnels in Hash Functions: MD5 Collisions Within a Minute. Cryptology ePrint Archive, Report 2006/105 (2006), http://eprint.iacr.org/
    • (2006)
    • Klima, V.1
  • 9
    • 33746768161 scopus 로고    scopus 로고
    • Mendel, F., Pramstaller, N., Rechberger, C., Rijmen, V.: The Impact of Carries on the Complexity of Collision Attacks on SHA-1. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, 4047, pp. 278-292. Springer, Heidelberg (2006)
    • Mendel, F., Pramstaller, N., Rechberger, C., Rijmen, V.: The Impact of Carries on the Complexity of Collision Attacks on SHA-1. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol. 4047, pp. 278-292. Springer, Heidelberg (2006)
  • 10
    • 38549144495 scopus 로고    scopus 로고
    • Improved Collision Search for SHA-0
    • Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
    • Naito, Y., Sasaki, Y., Shimoyama, T., Yajima, J., Kunihiro, N., Ohta, K.: Improved Collision Search for SHA-0. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 21-36. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 21-36
    • Naito, Y.1    Sasaki, Y.2    Shimoyama, T.3    Yajima, J.4    Kunihiro, N.5    Ohta, K.6
  • 11
    • 4043135942 scopus 로고    scopus 로고
    • August 2002, available online at
    • National Institute of Standards and Technology (NIST). FIPS-180-2: Secure Hash Standard (August 2002), available online at http://www.itl.nist .gov/f ipspubs/
    • FIPS-180-2: Secure Hash Standard
  • 12
    • 33646824396 scopus 로고    scopus 로고
    • Pramstaller, N., Rechberger, C., Rijmen, V.: Exploiting Coding Theory for Collision Attacks on SHA-1. In: Smart, N.P. (ed.) Cryptography and Coding. LNCS, 3796, pp. 78-95. Springer, Heidelberg (2005)
    • Pramstaller, N., Rechberger, C., Rijmen, V.: Exploiting Coding Theory for Collision Attacks on SHA-1. In: Smart, N.P. (ed.) Cryptography and Coding. LNCS, vol. 3796, pp. 78-95. Springer, Heidelberg (2005)
  • 13
    • 24144478826 scopus 로고    scopus 로고
    • Rijmen, V., Oswald, E.: Update on sha-1. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, 3376, pp. 58-71. Springer, Heidelberg (2005)
    • Rijmen, V., Oswald, E.: Update on sha-1. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 58-71. Springer, Heidelberg (2005)
  • 14
    • 38349029413 scopus 로고    scopus 로고
    • Sugita, M., Kawazoe, M., Perret, L., Imai, H.: Algebraic Cryptanalysis of 58-round SHA-1. In: Biryukov, A. (ed.) FSE 2007. LNCS, 4593, pp. 349-365. Springer, Heidelberg (2007)
    • Sugita, M., Kawazoe, M., Perret, L., Imai, H.: Algebraic Cryptanalysis of 58-round SHA-1. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 349-365. Springer, Heidelberg (2007)
  • 15
    • 24944575304 scopus 로고    scopus 로고
    • Cryptanalysis of the Hash Functions MD4 and RIPEMD
    • Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the Hash Functions MD4 and RIPEMD. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 1-18. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 1-18
    • Wang, X.1    Lai, X.2    Feng, D.3    Chen, H.4    Yu, X.5
  • 16
    • 38549086691 scopus 로고    scopus 로고
    • Wang, X., Yao, A., Yao, F.: Cryptanalysis of SHA-1. In: Cryptographic Hash Workshop hosted by NIST (October 2005)
    • Wang, X., Yao, A., Yao, F.: Cryptanalysis of SHA-1. In: Cryptographic Hash Workshop hosted by NIST (October 2005)
  • 17
    • 38549103939 scopus 로고    scopus 로고
    • Wang, X., Yao, A., Yao, F.: New Collision Search for SHA-1. In: Presented at rump session of CRYPTO 2005 (August 2005)
    • Wang, X., Yao, A., Yao, F.: New Collision Search for SHA-1. In: Presented at rump session of CRYPTO 2005 (August 2005)
  • 18
    • 33745171465 scopus 로고    scopus 로고
    • Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, 3621, pp. 17-36. Springer, Heidelberg (2005)
    • Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17-36. Springer, Heidelberg (2005)
  • 19
    • 24944591357 scopus 로고    scopus 로고
    • How to Break MD5 and Other Hash Functions
    • Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2
  • 20
    • 33745122987 scopus 로고    scopus 로고
    • Efficient Collision Search Attacks on SHA-0
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Wang, X., Yu, H., Yin, Y.L.: Efficient Collision Search Attacks on SHA-0. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 1-16. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 1-16
    • Wang, X.1    Yu, H.2    Yin, Y.L.3
  • 21
    • 4344660706 scopus 로고    scopus 로고
    • The Full Cost of Cryptanalytic Attacks
    • Wiener, M.J.: The Full Cost of Cryptanalytic Attacks. J. Cryptology 17(2), 105-124 (2004)
    • (2004) J. Cryptology , vol.17 , Issue.2 , pp. 105-124
    • Wiener, M.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.