-
1
-
-
35048892549
-
Near-Collisions of SHA-0
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Biham, E., Chen, R.: Near-Collisions of SHA-0. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 290-305. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 290-305
-
-
Biham, E.1
Chen, R.2
-
2
-
-
0031675932
-
A New Algorithm for Finding Minimum-Weight Words in a Linear Code: Application to McEliece's Cryptosystem and to Narrow-Sense BCH Codes of Length 511
-
Canteaut, A., Chabaud, F.: A New Algorithm for Finding Minimum-Weight Words in a Linear Code: Application to McEliece's Cryptosystem and to Narrow-Sense BCH Codes of Length 511. IEEE Transactions on Information Theory 44(1), 367-378 (1998)
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.1
, pp. 367-378
-
-
Canteaut, A.1
Chabaud, F.2
-
3
-
-
84957643546
-
Differential Collisions in SHA-0
-
Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
-
Chabaud, F., Joux, A.: Differential Collisions in SHA-0. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 56-71. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 56-71
-
-
Chabaud, F.1
Joux, A.2
-
4
-
-
38049111724
-
EUROCRYPT 2005
-
Cramer, R.J.F, ed, Springer, Heidelberg
-
Cramer, R.J.F. (ed.): EUROCRYPT 2005. LNCS, vol. 3494. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
-
-
-
5
-
-
35048844179
-
-
Gilbert, H., Handschuh, H.: Security Analysis of SHA-256 and Sisters. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, 3006, pp. 175-193. Springer, Heidelberg (2004)
-
Gilbert, H., Handschuh, H.: Security Analysis of SHA-256 and Sisters. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 175-193. Springer, Heidelberg (2004)
-
-
-
-
7
-
-
45749140867
-
-
Hölbl, M., Rechberger, C., Welzer, T.: Finding Message Pairs Conforming to Simple SHA-256 Characteristics. In: Lucks, S., Sadeghi, A.-R., Wolf, C. (eds.) Stefan Lucks, Ahmad-Reza Sadeghi, and Christopher Wolf, editors, Preliminary Proceeding Records of WEWoRC 2007 - Western European Workshop on Research in Cryptology, Bochum, Germany, pp. 21-25 (2007), http://www.hgi.rub. de/weworc07/PreliminaryConferenceRecord.pdf
-
Hölbl, M., Rechberger, C., Welzer, T.: Finding Message Pairs Conforming to Simple SHA-256 Characteristics. In: Lucks, S., Sadeghi, A.-R., Wolf, C. (eds.) Stefan Lucks, Ahmad-Reza Sadeghi, and Christopher Wolf, editors, Preliminary Proceeding Records of WEWoRC 2007 - Western European Workshop on Research in Cryptology, Bochum, Germany, pp. 21-25 (2007), http://www.hgi.rub. de/weworc07/PreliminaryConferenceRecord.pdf
-
-
-
-
8
-
-
0024078914
-
A Probabilistic Algorithm for Computing Minimum Weights of Large Error-Correcting Codes
-
Leon, J.S.: A Probabilistic Algorithm for Computing Minimum Weights of Large Error-Correcting Codes. IEEE Transactions on Information Theory 34(5), 1354-1359 (1988)
-
(1988)
IEEE Transactions on Information Theory
, vol.34
, Issue.5
, pp. 1354-1359
-
-
Leon, J.S.1
-
10
-
-
84896851939
-
-
Matusiewicz, K., Pieprzyk, J., Pramstaller, N., Rechberger, C., Rijmen, V.: Analysis of simplified variants of SHA-256. In: Wolf, C., Lucks, S., Yau, P.-W. (eds.) WEWoRC 2005 - Western European Workshop on Research in Cryptology, Leuven, Belgium, July 5-7, 2005. LNI, 74, pp. 123-134. GI (2005)
-
Matusiewicz, K., Pieprzyk, J., Pramstaller, N., Rechberger, C., Rijmen, V.: Analysis of simplified variants of SHA-256. In: Wolf, C., Lucks, S., Yau, P.-W. (eds.) WEWoRC 2005 - Western European Workshop on Research in Cryptology, Leuven, Belgium, July 5-7, 2005. LNI, vol. 74, pp. 123-134. GI (2005)
-
-
-
-
11
-
-
33746664225
-
-
Mendel, F., Pramstaller, N., Rechberger, C., Rijmen, V.: Analysis of Step-Reduced SHA-256. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, 4047, pp. 126-143. Springer, Heidelberg (2006)
-
Mendel, F., Pramstaller, N., Rechberger, C., Rijmen, V.: Analysis of Step-Reduced SHA-256. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol. 4047, pp. 126-143. Springer, Heidelberg (2006)
-
-
-
-
12
-
-
45749141667
-
-
March 2008
-
Mendel, F., Pramstaller, N., Rechberger, C., Rijmen, V.: Analysis of Step-Reduced SHA-256. Cryptology eprint Archive (March 2008), http://eprint.iacr.org/2008/130
-
Analysis of Step-Reduced SHA-256. Cryptology eprint Archive
-
-
Mendel, F.1
Pramstaller, N.2
Rechberger, C.3
Rijmen, V.4
-
13
-
-
50249152930
-
-
Nikolić, I., Biryukov, A.: Collisions for Step-Reduced SHA-256. In: Nyberg, K. (ed.) Fast Software Encryption 2008. Pre-proceedings version of Lecture Notes in Computer Science, pp. 1-16. Springer, Heidelberg (2008)
-
Nikolić, I., Biryukov, A.: Collisions for Step-Reduced SHA-256. In: Nyberg, K. (ed.) Fast Software Encryption 2008. volume Pre-proceedings version of Lecture Notes in Computer Science, pp. 1-16. Springer, Heidelberg (2008)
-
-
-
-
14
-
-
33646824396
-
-
Pramstaller, N., Rechberger, C., Rijmen, V.: Exploiting Coding Theory for Collision Attacks on SHA-1. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, 3796, pp. 78-95. Springer, Heidelberg (2005)
-
Pramstaller, N., Rechberger, C., Rijmen, V.: Exploiting Coding Theory for Collision Attacks on SHA-1. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, vol. 3796, pp. 78-95. Springer, Heidelberg (2005)
-
-
-
-
15
-
-
24144478826
-
-
Rijmen, V., Oswald, E.: Update on SHA-1. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, 3376, pp. 58-71. Springer, Heidelberg (2005)
-
Rijmen, V., Oswald, E.: Update on SHA-1. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 58-71. Springer, Heidelberg (2005)
-
-
-
-
16
-
-
38149131741
-
New Local Collisions for the SHA-2 Hash Family
-
Nam, K.-H, Rhee, G, eds, ICISC 2007, Springer, Heidelberg
-
Sanadhya, S.K., Sarkar, P.: New Local Collisions for the SHA-2 Hash Family. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol. 4817, pp. 193-205. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4817
, pp. 193-205
-
-
Sanadhya, S.K.1
Sarkar, P.2
-
18
-
-
0003629990
-
-
Department of Commerce, National Institute of Standards and Technology NIST
-
Secure Hash Standard. Federal Information Processing Standard Publication 180-2. U.S. Department of Commerce, National Institute of Standards and Technology (NIST) (2002), http://csrc.nist.gov/publications/fips/fips180-2/ fips180-2withchangenotice.pdf
-
(2002)
Secure Hash Standard. Federal Information Processing Standard Publication 180-2. U.S
-
-
-
19
-
-
84964937021
-
-
Stern, J.: A Method for Finding Codewords of Small Weight. In: Wolfmann, J., Cohen, G. (eds.) Coding Theory 1988. LNCS, 388, pp. 106-113. Springer, Heidelberg (1989)
-
Stern, J.: A Method for Finding Codewords of Small Weight. In: Wolfmann, J., Cohen, G. (eds.) Coding Theory 1988. LNCS, vol. 388, pp. 106-113. Springer, Heidelberg (1989)
-
-
-
-
20
-
-
24944575304
-
-
Cramer [4, pp
-
Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the Hash Functions MD4 and RIPEMD. In: Cramer [4], pp. 1-18
-
Cryptanalysis of the Hash Functions MD4 and RIPEMD
, pp. 1-18
-
-
Wang, X.1
Lai, X.2
Feng, D.3
Chen, H.4
Yu, X.5
-
21
-
-
33745171465
-
-
Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, 3621, pp. 17-36. Springer, Heidelberg (2005)
-
Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17-36. Springer, Heidelberg (2005)
-
-
-
-
23
-
-
33745589233
-
-
Yoshida, H., Biryukov, A.: Analysis of a SHA-256 Variant. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, 3897, pp. 245-260. Springer, Heidelberg (2006)
-
Yoshida, H., Biryukov, A.: Analysis of a SHA-256 Variant. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 245-260. Springer, Heidelberg (2006)
-
-
-
|