Collisions of SHA-0 and Reduced SHA-1
From MaRDI portal
Publication:5385721
DOI10.1007/11426639_3zbMath1137.94337OpenAlexW2130238828MaRDI QIDQ5385721
William Jalby, Christophe Lemuet, Eli Biham, Antoine Joux, Patrick Carribault, Rafi Chen
Publication date: 6 May 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11426639_3
Related Items (19)
Classification of disturbance vectors for collision attack in SHA-1 ⋮ Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD ⋮ New second-preimage attacks on hash functions ⋮ A structure-based chaotic hashing scheme ⋮ A provably secure non-iterative hash function resisting birthday attack ⋮ Security analysis of randomize-hash-then-sign digital signatures ⋮ Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography ⋮ Classification and generation of disturbance vectors for collision attacks against SHA-1 ⋮ Collisions of SHA-0 and Reduced SHA-1 ⋮ Herding Hash Functions and the Nostradamus Attack ⋮ Cryptanalysis of SHA-0 and reduced SHA-1 ⋮ Collisions for 70-Step SHA-1: On the Full Cost of Collision Search ⋮ MJH: A Faster Alternative to MDC-2 ⋮ Rotational rebound attacks on reduced Skein ⋮ Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC ⋮ Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL ⋮ Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance ⋮ Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256 ⋮ How to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash Functions
Cites Work
- Classification and generation of disturbance vectors for collision attacks against SHA-1
- Algebraic Cryptanalysis of 58-Round SHA-1
- Hash Functions and the (Amplified) Boomerang Attack
- Collisions of SHA-0 and Reduced SHA-1
- Efficient Collision Search Attacks on SHA-0
- Finding Collisions in the Full SHA-1
- Topics in Cryptology – CT-RSA 2005
- Cryptography and Coding
- Coding and Cryptography
This page was built for publication: Collisions of SHA-0 and Reduced SHA-1