메뉴 건너뛰기




Volumn 5107 LNCS, Issue , 2008, Pages 254-266

Non-linear reduced round attacks against SHA-2 Hash family

Author keywords

[No Author keywords available]

Indexed keywords

HASH FUNCTIONS; SECURITY OF DATA;

EID: 70349860117     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-70500-0_19     Document Type: Conference Paper
Times cited : (14)

References (14)
  • 1
    • 84957643546 scopus 로고    scopus 로고
    • Differential collisions in SHA-0
    • Krawczyk H. (ed.) CRYPTO 1998. Springer, Heidelberg
    • Chabaud, F., Joux, A.: Differential Collisions in SHA-0. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.1462, pp. 56-71. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 56-71
    • Chabaud, F.1    Joux, A.2
  • 2
    • 35048844179 scopus 로고    scopus 로고
    • Security analysis of SHA-256 and sisters
    • Matsui, M., Zuccherato, R.J. (eds.), 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15. Springer, Heidelberg
    • Gilbert, H., Handschuh, H.: Security Analysis of SHA-256 and Sisters. In: Matsui, M., Zuccherato, R.J. (eds.) Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003. LNCS, vol.3006, pp. 175-193. Springer, Heidelberg (2003)
    • (2003) Selected Areas in Cryptography 2003 , vol.3006 , pp. 175-193
    • Gilbert, H.1    Handschuh, H.2
  • 3
    • 38149128345 scopus 로고    scopus 로고
    • On corrective patterns for the SHA-2 family
    • August
    • Hawkes, P., Paddon, M., Rose, G.G.: On Corrective Patterns for the SHA-2 Family. Cryptology eprint Archive (August 2004), http://eprint.iacr.org/2004/207
    • (2004) Cryptology Eprint Archive
    • Hawkes, P.1    Paddon, M.2    Rose, G.G.3
  • 4
    • 33746664225 scopus 로고    scopus 로고
    • Analysis of Step-Reduced SHA-256
    • Robshaw M.J.B. (ed.) FSE 2006. Springer, Heidelberg
    • Mendel, F., Pramstaller, N., Rechberger, C., Rijmen, V.: Analysis of Step-Reduced SHA-256. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol.4047, pp. 126-143. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4047 , pp. 126-143
    • Mendel, F.1    Pramstaller, N.2    Rechberger, C.3    Rijmen, V.4
  • 6
    • 50249152930 scopus 로고    scopus 로고
    • Collisions for step-reduced SHA-256
    • Nyberg K. (ed.) Fast Software Encryption 2008. Springer, Heidelberg
    • Nikolíc, I., Biryukov, A.: Collisions for Step-Reduced SHA-256. In: Nyberg, K. (ed.) Fast Software Encryption 2008. LNCS, pp. 1-16. Springer, Heidelberg (2008)
    • (2008) LNCS , pp. 1-16
    • Nikolíc, I.1    Biryukov, A.2
  • 7
    • 38149131741 scopus 로고    scopus 로고
    • New local collisions for the SHA-2 hash family
    • Nam, K.-H., Rhee, G. (eds.) ICISC 2007. Springer, Heidelberg
    • Sanadhya, S.K., Sarkar, P.: New Local Collisions for the SHA-2 Hash Family. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol.4817, pp. 193-205. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4817 , pp. 193-205
    • Sanadhya, S.K.1    Sarkar, P.2
  • 8
    • 45749105976 scopus 로고    scopus 로고
    • Attacking reduced round SHA-256
    • Bellovin, S., Gennaro, R. (eds.) ACNS 2008. Springer, Heidelberg , to appear
    • Sanadhya, S.K., Sarkar, P.: Attacking Reduced Round SHA-256. In: Bellovin, S., Gennaro, R. (eds.) ACNS 2008. LNCS. Springer, Heidelberg (to appear, 2008)
    • (2008) LNCS
    • Sanadhya, S.K.1    Sarkar, P.2
  • 9
    • 70349887025 scopus 로고    scopus 로고
    • Non-Linear reduced round attacks against SHA-2 hash family
    • April
    • Sanadhya, S.K., Sarkar, P.: Non-Linear Reduced Round Attacks Against SHA-2 Hash family. Cryptology eprint Archive (April 2008), http://eprint.iacr. org/2008/174
    • (2008) Cryptology Eprint Archive
    • Sanadhya, S.K.1    Sarkar, P.2
  • 10
    • 38149141484 scopus 로고    scopus 로고
    • CRYPTO 2005
    • Shoup, V. (ed.). Springer, Heidelberg
    • Shoup, V. (ed.): CRYPTO 2005. LNCS, vol.3621. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621
  • 11
    • 54949085936 scopus 로고    scopus 로고
    • Secure Hash Standard. Publication 180-182. U.S. Department of Commerce, National Institute of Standards and Technology( NIST
    • Secure Hash Standard. Federal Information Processing Standard Publication 180-182 U.S. Department of Commerce, National Institute of Standards and Technology( NIST) (2002), http://csrc.nist.gov/publications/fips/fips180-2/ fips180-2withchangenotice.pdf
    • (2002) Federal Information Processing Standard
  • 13
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • Cramer R.J.F. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol.3494, pp. 19-35. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2
  • 14
    • 33745122987 scopus 로고    scopus 로고
    • Eficient collision search attacks on SHA-0
    • Wang, X., Yu, H., Yin, Y.L.: eficient Collision Search Attacks on SHA-0. In: Shoup [10], pp. 1-16
    • Shoup , vol.10 , pp. 1-16
    • Wang, X.1    Yu, H.2    Yin, Y.L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.