Classification of disturbance vectors for collision attack in SHA-1
From MaRDI portal
Publication:5046483
DOI10.1007/s11432-015-5280-3zbMath1497.94116OpenAlexW2286743549MaRDI QIDQ5046483
Wenbao Han, Yuchen Tang, Guang Zeng
Publication date: 28 October 2022
Published in: Science China Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11432-015-5280-3
Cites Work
- Classification and generation of disturbance vectors for collision attacks against SHA-1
- Algebraic Cryptanalysis of 58-Round SHA-1
- Hash Functions and the (Amplified) Boomerang Attack
- Collisions of SHA-0 and Reduced SHA-1
- Finding Collisions in the Full SHA-1
- Finding SHA-1 Characteristics: General Results and Applications
- Topics in Cryptology – CT-RSA 2005
- Cryptography and Coding
- Coding and Cryptography
This page was built for publication: Classification of disturbance vectors for collision attack in SHA-1