Second-order differential collisions for reduced SHA-256
From MaRDI portal
Publication:3102192
DOI10.1007/978-3-642-25385-0_15zbMATH Open1227.94031OpenAlexW63858338MaRDI QIDQ3102192FDOQ3102192
Authors: Alex Biryukov, Mario Lamberger, Florian Mendel, Ivica Nikolić
Publication date: 2 December 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-25385-0_15
Recommendations
Cited In (25)
- Selected Areas in Cryptography
- Efficient implementation of SHA-3 hash function on 8-bit AVR-based sensor nodes
- Analysis of Step-Reduced SHA-256
- Quantum collision attacks on reduced SHA-256 and SHA-512
- Attacking Reduced Round SHA-256
- Second order collision for the 42-step reduced DHA-256 hash function
- Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family
- Boomerang Distinguisher for the SIMD-512 Compression Function
- Second-preimage analysis of reduced SHA-1
- Characterizing collision and second-preimage resistance in Linicrypt
- Analysis of Reduced-SHAvite-3-256 v2
- Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
- Finding Collisions for Reduced Luffa-256 v2 (Poster)
- Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis
- New records in collision attacks on SHA-2
- Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160
- The boomerang attacks on the round-reduced Skein-512
- Finding SHA-2 characteristics: searching through a minefield of contradictions
- Boomerang attack on step-reduced SHA-512
- Limited-birthday distinguishers for hash functions. Collisions beyond the birthday bound can be meaningful
- Analysis of a SHA-256 Variant
- Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK
- Boomerang and slide-rotational analysis of the SM3 hash function
- Practical collisions for SHAMATA-256
This page was built for publication: Second-order differential collisions for reduced SHA-256
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3102192)