Practical Free-Start Collision Attacks on 76-step SHA-1
From MaRDI portal
Publication:3457131
DOI10.1007/978-3-662-47989-6_30zbMath1375.94137OpenAlexW2183375419MaRDI QIDQ3457131
Pierre Karpman, Thomas Peyrin, Marc Stevens
Publication date: 10 December 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-47989-6_30
Related Items (2)
On the cost of ASIC hardware crackers: a SHA-1 case study ⋮ The phantom of differential characteristics
Uses Software
Cites Work
- Advances in cryptology -- EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22--26, 2005. Proceedings
- Advances in cryptology - CRYPTO '89. Proceedings of a conference held at the University of California, Santa Barbara, CA (USA), August 20-24, 1989
- Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
- Classification and generation of disturbance vectors for collision attacks against SHA-1
- Counter-Cryptanalysis
- Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Hash Functions and the (Amplified) Boomerang Attack
- Rebound Distinguishers: Results on the Full Whirlpool Compression Function
- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
- Cryptanalysis of MD4
- Improved Rebound Attack on the Finalist Grøstl
- Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities
- Finding Collisions in the Full SHA-1
- Collisions for 70-Step SHA-1: On the Full Cost of Collision Search
- Finding SHA-1 Characteristics: General Results and Applications
This page was built for publication: Practical Free-Start Collision Attacks on 76-step SHA-1