-
1
-
-
35048892549
-
Near-Collisions of SHA-0
-
Franklin, M. (ed.), Springer, Heidelberg
-
Biham, E., Chen, R.: Near-Collisions of SHA-0. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 290-305. Springer, Heidelberg (2004)
-
(2004)
CRYPTO 2004. LNCS
, vol.3152
, pp. 290-305
-
-
Biham, E.1
Chen, R.2
-
2
-
-
0040553594
-
An improved Monte Carlo factorization algorithm
-
Brent, R.P.: An improved Monte Carlo factorization algorithm. BIT 20(2), 176-184 (1980)
-
(1980)
BIT
, vol.20
, Issue.2
, pp. 176-184
-
-
Brent, R.P.1
-
3
-
-
84957643546
-
Differential Collisions in SHA-0
-
Advances in Cryptology - CRYPTO '98
-
Chabaud, F., Joux, A.: Differential Collisions in SHA-0. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 56-71. Springer, Heidelberg (1998) (Pubitemid 128118997)
-
(1998)
Lecture Notes in Computer Science
, Issue.1462
, pp. 56-71
-
-
Chabaud, F.1
Joux, A.2
-
4
-
-
0004222925
-
-
North-Holland Mathematical Library, North-Holland Publishing Co., Amsterdam
-
Cohen, G., Honkala, I., Litsyn, S., Lobstein, A.: Covering codes. North-Holland Mathematical Library, vol. 54. North-Holland Publishing Co., Amsterdam (1997)
-
(1997)
Covering Codes
, vol.54
-
-
Cohen, G.1
Honkala, I.2
Litsyn, S.3
Lobstein, A.4
-
5
-
-
38549144112
-
Collisions for 70-step SHA-1: On the full cost of collision search
-
Selected Areas in Cryptography - 14th International Workshop, SAC 2007, Revised Selected Papers
-
De Cannìere, C., Mendel, F., Rechberger, C.: Collisions for 70-Step SHA-1: On the Full Cost of Collision Search. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876, pp. 56-73. Springer, Heidelberg (2007) (Pubitemid 351153077)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4876
, pp. 56-73
-
-
De Canniere, C.1
Mendel, F.2
Rechberger, C.3
-
6
-
-
38049183978
-
Finding SHA-1 characteristics: General results and applications
-
Lai, X., Chen, K. (eds.), Springer, Heidelberg
-
De Cannìere, C., Rechberger, C.: Finding SHA-1 Characteristics: General Results and Applications. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 1-20. Springer, Heidelberg (2006)
-
(2006)
ASIACRYPT 2006. LNCS
, vol.4284
, pp. 1-20
-
-
De Cannìere, C.1
Rechberger, C.2
-
7
-
-
0005268716
-
Cryptanalysis of MD4
-
Dobbertin, H.: Cryptanalysis of MD4. J. Cryptology 11(4), 253-271 (1998) (Pubitemid 128728056)
-
(1998)
Journal of Cryptology
, vol.11
, Issue.4
, pp. 253-271
-
-
Dobbertin, H.1
-
10
-
-
77949530882
-
Optimal hash functions for approximate matches on the n-cube
-
Gordon, D., Miller, V., Ostapenko, P.: Optimal hash functions for approximate matches on the n-cube. IEEE Trans. Inform. Theory 56(3), 984-991 (2010)
-
(2010)
IEEE Trans. Inform. Theory
, vol.56
, Issue.3
, pp. 984-991
-
-
Gordon, D.1
Miller, V.2
Ostapenko, P.3
-
13
-
-
79952596731
-
-
December, short talk presented at the ASIACRYPT 2009 rump session
-
Lamberger, M., Mendel, F., Rijmen, V., Simoens, K.: Memoryless Near- Collisions via Coding Theory (December 2009), http://asiacrypt2009. cipher.risk.tsukuba.ac.jp/rump/slides/13 NC-talk.pdf, (short talk) presented at the ASIACRYPT 2009 rump session
-
(2009)
Memoryless Near- Collisions Via Coding Theory
-
-
Lamberger, M.1
Mendel, F.2
Rijmen, V.3
Simoens, K.4
-
14
-
-
70350426602
-
On free-start collisions and collisions for TIB3
-
Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.), Springer, Heidelberg
-
Mendel, F., Schläffer, M.: On Free-Start Collisions and Collisions for TIB3. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 95-106. Springer, Heidelberg (2009)
-
(2009)
ISC 2009. LNCS
, vol.5735
, pp. 95-106
-
-
Mendel, F.1
Schläffer, M.2
-
15
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
16
-
-
50249181288
-
-
National Institute of Standards and Technology (NIST)
-
National Institute of Standards and Technology (NIST). Cryptographic Hash Project (2007), http://www.nist.gov/hash-competition
-
(2007)
Cryptographic Hash Project
-
-
-
17
-
-
1842610602
-
Cycle detection using a stack
-
Nivasch, G.: Cycle detection using a stack. Inf. Process. Lett. 90(3), 135-140 (2004)
-
(2004)
Inf. Process. Lett.
, vol.90
, Issue.3
, pp. 135-140
-
-
Nivasch, G.1
-
18
-
-
33646824396
-
Exploiting coding theory for collision attacks on SHA-1
-
DOI 10.1007/11586821-7, Cryptography and Coding - 10th IMA International Conference, Proceedings
-
Pramstaller, N., Rechberger, C., Rijmen, V.: Exploiting Coding Theory for Collision Attacks on SHA-1. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, vol. 3796, pp. 78-95. Springer, Heidelberg (2005) (Pubitemid 43774828)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3796
, pp. 78-95
-
-
Pramstaller, N.1
Rechberger, C.2
Rijmen, V.3
-
19
-
-
0028462216
-
An improvement of the VanWee bound for binary linear covering codes
-
Struik, R.: An improvement of the VanWee bound for binary linear covering codes. IEEE Transactions on Information Theory 40(4), 1280-1284 (1994)
-
(1994)
IEEE Transactions on Information Theory
, vol.40
, Issue.4
, pp. 1280-1284
-
-
Struik, R.1
-
20
-
-
17444376558
-
Parallel collision search with cryptanalytic applications
-
van Oorschot, P.C., Wiener, M.J.: Parallel Collision Search with Cryptanalytic Applications. J. Cryptology 12(1), 1-28 (1999)
-
(1999)
J. Cryptology
, vol.12
, Issue.1
, pp. 1-28
-
-
Van Oorschot, P.C.1
Wiener, M.J.2
-
21
-
-
0023981711
-
Improved sphere bounds on the covering radius of codes
-
van Wee, G.J.M.: Improved sphere bounds on the covering radius of codes. IEEE Transactions on Information Theory 34(2), 237-245 (1988)
-
(1988)
IEEE Transactions on Information Theory
, vol.34
, Issue.2
, pp. 237-245
-
-
Van Wee, G.J.M.1
-
22
-
-
33745171465
-
Finding collisions in the full SHA-1
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17-36. Springer, Heidelberg (2005) (Pubitemid 43902104)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621
, pp. 17-36
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
23
-
-
24944591357
-
How to break MD5 and other hash functions
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005) (Pubitemid 41313944)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
24
-
-
84950781609
-
How to swindle Rabin?
-
Yuval, G.: How to swindle Rabin? Cryptologia 3(3), 187-191 (1979)
-
(1979)
Cryptologia
, vol.3
, Issue.3
, pp. 187-191
-
-
Yuval, G.1
|