Non-linear Reduced Round Attacks against SHA-2 Hash Family
From MaRDI portal
Publication:3511168
DOI10.1007/978-3-540-70500-0_19zbMath1203.94122OpenAlexW1872530698MaRDI QIDQ3511168
Palash Sarkar, Somitra Kumar Sanadhya
Publication date: 8 July 2008
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-70500-0_19
Related Items (7)
Non-linear Reduced Round Attacks against SHA-2 Hash Family ⋮ Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family ⋮ Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512 ⋮ Analysis of entropy extraction efficiencies in random number generation systems ⋮ Collisions and Other Non-random Properties for Step-Reduced SHA-256 ⋮ A combinatorial analysis of recent attacks on step reduced SHA-2 family ⋮ New Collision Attacks against Up to 24-Step SHA-2
Cites Work
- Unnamed Item
- Advances in cryptology -- CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14--18, 2005. Proceedings
- Attacking Reduced Round SHA-256
- Non-linear Reduced Round Attacks against SHA-2 Hash Family
- Collisions for Step-Reduced SHA-256
- Analysis of Step-Reduced SHA-256
- How to Break MD5 and Other Hash Functions
- Efficient Collision Search Attacks on SHA-0
- Finding Collisions in the Full SHA-1
- Selected Areas in Cryptography
This page was built for publication: Non-linear Reduced Round Attacks against SHA-2 Hash Family