-
1
-
-
84957643546
-
Differential collisions in SHA-0
-
Krawczyk H. (ed.) CRYPTO 1998. Springer, Heidelberg
-
Chabaud, F., Joux, A.: Differential Collisions in SHA-0. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.1462, pp. 56-71. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 56-71
-
-
Chabaud, F.1
Joux, A.2
-
2
-
-
35048844179
-
Security analysis of SHA-256 and sisters
-
Matsui, M., Zuccherato, R.J. (eds.), 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15. Springer, Heidelberg
-
Gilbert, H., Handschuh, H.: Security Analysis of SHA-256 and Sisters. In: Matsui, M., Zuccherato, R.J. (eds.) Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003. LNCS, vol.3006, pp. 175-193. Springer, Heidelberg (2003)
-
(2003)
Selected Areas in Cryptography 2003
, vol.3006
, pp. 175-193
-
-
Gilbert, H.1
Handschuh, H.2
-
4
-
-
33746664225
-
Analysis of Step-Reduced SHA-256
-
Robshaw M.J.B. (ed.) FSE 2006. Springer, Heidelberg
-
Mendel, F., Pramstaller, N., Rechberger, C., Rijmen, V.: Analysis of Step-Reduced SHA-256. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol.4047, pp. 126-143. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4047
, pp. 126-143
-
-
Mendel, F.1
Pramstaller, N.2
Rechberger, C.3
Rijmen, V.4
-
5
-
-
70349888225
-
Analysis of step-reduced SHA-256
-
March
-
Mendel, F., Pramstaller, N., Rechberger, C., Rijmen, V.: Analysis of Step-Reduced SHA-256. Cryptology eprint Archive (March 2008), http://eprint.iacr.org/2008/130
-
(2008)
Cryptology Eprint Archive
-
-
Mendel, F.1
Pramstaller, N.2
Rechberger, C.3
Rijmen, V.4
-
6
-
-
50249152930
-
Collisions for step-reduced SHA-256
-
Nyberg K. (ed.) Fast Software Encryption 2008. Springer, Heidelberg
-
Nikolíc, I., Biryukov, A.: Collisions for Step-Reduced SHA-256. In: Nyberg, K. (ed.) Fast Software Encryption 2008. LNCS, pp. 1-16. Springer, Heidelberg (2008)
-
(2008)
LNCS
, pp. 1-16
-
-
Nikolíc, I.1
Biryukov, A.2
-
7
-
-
38149131741
-
New local collisions for the SHA-2 hash family
-
Nam, K.-H., Rhee, G. (eds.) ICISC 2007. Springer, Heidelberg
-
Sanadhya, S.K., Sarkar, P.: New Local Collisions for the SHA-2 Hash Family. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol.4817, pp. 193-205. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4817
, pp. 193-205
-
-
Sanadhya, S.K.1
Sarkar, P.2
-
8
-
-
45749105976
-
Attacking reduced round SHA-256
-
Bellovin, S., Gennaro, R. (eds.) ACNS 2008. Springer, Heidelberg , to appear
-
Sanadhya, S.K., Sarkar, P.: Attacking Reduced Round SHA-256. In: Bellovin, S., Gennaro, R. (eds.) ACNS 2008. LNCS. Springer, Heidelberg (to appear, 2008)
-
(2008)
LNCS
-
-
Sanadhya, S.K.1
Sarkar, P.2
-
9
-
-
70349887025
-
Non-Linear reduced round attacks against SHA-2 hash family
-
April
-
Sanadhya, S.K., Sarkar, P.: Non-Linear Reduced Round Attacks Against SHA-2 Hash family. Cryptology eprint Archive (April 2008), http://eprint.iacr. org/2008/174
-
(2008)
Cryptology Eprint Archive
-
-
Sanadhya, S.K.1
Sarkar, P.2
-
10
-
-
38149141484
-
CRYPTO 2005
-
Shoup, V. (ed.). Springer, Heidelberg
-
Shoup, V. (ed.): CRYPTO 2005. LNCS, vol.3621. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
-
-
-
11
-
-
54949085936
-
-
Secure Hash Standard. Publication 180-182. U.S. Department of Commerce, National Institute of Standards and Technology( NIST
-
Secure Hash Standard. Federal Information Processing Standard Publication 180-182 U.S. Department of Commerce, National Institute of Standards and Technology( NIST) (2002), http://csrc.nist.gov/publications/fips/fips180-2/ fips180-2withchangenotice.pdf
-
(2002)
Federal Information Processing Standard
-
-
-
12
-
-
33646754186
-
-
Shoup (ed.)
-
Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup (ed.) [10], pp. 17-36
-
Finding Collisions in the Full SHA-1
, vol.10
, pp. 17-36
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
13
-
-
24944591357
-
How to break MD5 and other hash functions
-
Cramer R.J.F. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol.3494, pp. 19-35. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
14
-
-
33745122987
-
Eficient collision search attacks on SHA-0
-
Wang, X., Yu, H., Yin, Y.L.: eficient Collision Search Attacks on SHA-0. In: Shoup [10], pp. 1-16
-
Shoup
, vol.10
, pp. 1-16
-
-
Wang, X.1
Yu, H.2
Yin, Y.L.3
|