메뉴 건너뛰기




Volumn 4377 LNCS, Issue , 2007, Pages 20-30

A simple related-key attack on the full SHACAL-1

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84897580639     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11967668_2     Document Type: Conference Paper
Times cited : (8)

References (34)
  • 1
    • 0028494723 scopus 로고
    • New Types of Cryptanalytic Attacks Using Related Keys
    • Springer-Verlag
    • Eli Biham, New Types of Cryptanalytic Attacks Using Related Keys, Journal of Cryptology, Vol. 7, No. 4, pp. 229–246, Springer-Verlag, 1994.
    • (1994) Journal of Cryptology , vol.7 , Issue.4 , pp. 229-246
    • Biham, E.1
  • 3
    • 24944584156 scopus 로고    scopus 로고
    • Collisions of SHA-0 and Reduced SHA-1, Advances in Cryptology, proceedings of EUROCRYPT 2005
    • Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby, Collisions of SHA-0 and Reduced SHA-1, Advances in Cryptology, proceedings of EUROCRYPT 2005, Lecture Notes in Computer Science 3621, pp. 36–57, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 36-57
    • Biham, E.1    Chen, R.2    Joux, A.3    Carribault, P.4    Lemuet, C.5    Jalby, W.6
  • 9
    • 85025806786 scopus 로고
    • Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag
    • Eli Biham, Adi Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.
    • (1993)
    • Biham, E.1    Shamir, A.2
  • 10
    • 84957610784 scopus 로고    scopus 로고
    • Slide Attacks, proceedings of Fast Software Encryption 6
    • Springer-Verlag
    • Alex Biryukov, David Wagner, Slide Attacks, proceedings of Fast Software Encryption 6, Lecture Notes in Computer Science 1636, pp. 245–259, Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1636 , pp. 245-259
    • Biryukov, A.1    Wagner, D.2
  • 13
    • 85025809375 scopus 로고    scopus 로고
    • Related-Key Rectangle Attack on the Full SHACAL-1
    • appear in Lecture Notes in Computer Science
    • Orr Dunkelman, Nathan Keller, Jongsung Kim, Related-Key Rectangle Attack on the Full SHACAL-1, accepted to Selected Areas in Cryptography 2006, to appear in Lecture Notes in Computer Science.
    • (2006) Accepted to Selected Areas in Cryptography
    • Dunkelman, O.1    Keller, N.2    Kim, J.3
  • 22
    • 35048892576 scopus 로고
    • Cryptanalysis of LOKI91, proceedings of Auscrypt 1992
    • Springer-Verlag
    • Lars R. Knudsen, Cryptanalysis of LOKI91, proceedings of Auscrypt 1992, Lecture Notes in Computer Science 718, pp. 196–208, Springer-Verlag, 1993.
    • (1993) Lecture Notes in Computer Science , vol.718 , pp. 196-208
    • Knudsen, L.R.1
  • 24
    • 85025812732 scopus 로고    scopus 로고
    • New European Schemes for Signatures
    • NESSIE – New European Schemes for Signatures, Integrity and Encryption. http://www.nessie.eu.org/nessie
    • Integrity and Encryption
  • 29
    • 84945126868 scopus 로고    scopus 로고
    • The Boomerang Attack, proceedings of Fast Software Encryption 6
    • David Wagner, The Boomerang Attack, proceedings of Fast Software Encryption 6, Lecture Notes in Computer Science 1636, pp. 156–170, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1636 , pp. 156-170
    • Wagner, D.1
  • 30
    • 85025832410 scopus 로고    scopus 로고
    • Cryptographic Hash Workshop, NIST, Gaithersburg
    • Xiaoyun Wang, Andrew C. Yao, Frances Yao, Cryptanalysis on SHA-1, Cryptographic Hash Workshop, NIST, Gaithersburg, 2005.
    • (2005) Cryptanalysis on SHA-1
    • Wang, X.1    Yao, A.C.2    Yao, F.3
  • 31
    • 24944575304 scopus 로고    scopus 로고
    • Cryptanalysis of the Hash Functions MD4 and RIPEMD, Advances in Cryptology, proceedings of EUROCRYPT 2005
    • Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu, Cryptanalysis of the Hash Functions MD4 and RIPEMD, Advances in Cryptology, proceedings of EUROCRYPT 2005, Lecture Notes in Computer Science 3494, pp. 1–18, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 1-18
    • Wang, X.1    Lai, X.2    Feng, D.3    Chen, H.4    Yu, X.5
  • 32
    • 33745171465 scopus 로고    scopus 로고
    • Finding Collisions in the Full SHA-1, Advances in Cryptology, proceedings of CRYPTO 2005
    • Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu, Finding Collisions in the Full SHA-1, Advances in Cryptology, proceedings of CRYPTO 2005, Lecture Notes in Computer Science 3621, pp. 17–36, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 17-36
    • Wang, X.1    Yin, Y.L.2    Hongbo, Y.3
  • 33
    • 24944591357 scopus 로고    scopus 로고
    • How to Break MD5 and Other Hash Functions, Advances in Cryptology, proceedings of EUROCRYPT 2005
    • Xiaoyun Wang, Hongbo Yu, How to Break MD5 and Other Hash Functions, Advances in Cryptology, proceedings of EUROCRYPT 2005, Lecture Notes in Computer Science 3494, pp. 19–35, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2
  • 34
    • 33745122987 scopus 로고    scopus 로고
    • Efficient Collision Search Attacks on SHA-0, Advances in Cryptology, proceedings of CRYPTO 2005
    • Xiaoyun Wang, Hongbo Yu, Yiqun Lisa Yin, Efficient Collision Search Attacks on SHA-0, Advances in Cryptology, proceedings of CRYPTO 2005, Lecture Notes in Computer Science 3621, pp. 1–16, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 1-16
    • Wang, X.1    Hongbo, Y.2    Yin, Y.L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.